E Viola, A Wigderson - Twenty-Second Annual IEEE …, 2007 - ieeexplore.ieee.org
This paper presents a unified and simple treatment of basic questions concerning two computational models: multiparty communication complexity and GF (2) polynomials. The …
V Kolici, T Inaba, A Lala, G Mino… - … on Network-Based …, 2014 - ieeexplore.ieee.org
Call Admission Control (CAC) is one of the resource management functions, which regulates network access to ensure QoS provisioning. However, the decision for CAC is very …
Call Admission Control (CAC) is one of the resource management functions which regulates network access to ensure QoS provisioning. However, the decision for CAC is very …
B Larose, C Loten, C Tardif - Logical Methods in Computer …, 2007 - lmcs.episciences.org
We describe simple algebraic and combinatorial characterisations of finite relational core structures admitting finitely many obstructions. As a consequence, we show that it is …
T Inaba, D Elmazi, S Sakamoto… - Journal of Mobile …, 2015 - journals.riverpublishers.com
As the demand for multimedia services over the air has been steadily increasing over the last few years, wireless multimedia networks have been a very active research area. To …
T Inaba, S Sakamoto, V Kolici, G Mino… - … on Broadband and …, 2014 - ieeexplore.ieee.org
Call Admission Control (CAC) is one of the resource management functions, which regulates network access to ensure QoS provisioning. However, the decision for CAC is very …
KM Baalamurugan, S Vijay Bhanu - The Journal of Supercomputing, 2020 - Springer
In cloud computing, the major task is to make efficient use of resources. The growth in cloud environment opens door for vast research. Placement of virtual machine is a main problem …
NMN Pham, VS Le - Journal of Information and …, 2017 - Taylor & Francis
Over the past few years, using cloud computing technology has become popular. With the cloud computing service providers, reducing the number of physical machines providing …
In P2P systems, each peer has to obtain information of other peers and propagate the information to other peers through neighboring peers. Thus, it is important for each peer to …