American University in Cairo

Displaying 1-6 of 6 results

  • White Papers // Oct 2014

    On the Stable Throughput of Cooperative Cognitive Radio Networks with Finite Relaying Buffer

    In this paper, the authors study the problem of cooperative communications in cognitive radio systems where the secondary user has limited relaying room for the overheard primary packets. More specifically, they characterize the stable throughput region of a cognitive radio network with a finite relaying buffer at the secondary user....

    Provided By American University in Cairo

  • White Papers // Mar 2012

    Cognitive Multiple Access Using Soft Sensing and Secondary Channel State Information

    The authors consider a random access primary network. At the beginning of each time slot, a number of secondary users sense the channel and make an access decision based on the spectrum sensing outcome and the Channel State Information (CSI). Specifically, the channel is accessed by a secondary transmitter with...

    Provided By American University in Cairo

  • White Papers // Jan 2011

    A Locked Cache-Based Synchronization Protocol for CMP

    CMP processors are already replacing complex single core superscalar processor architectures. They offer better performance per watt and area. This is especially true in TLP rich server and web applications. Process / thread synchronization is important since CMP consists of multiple processor cores sharing cache resources including shared data structures....

    Provided By American University in Cairo

  • White Papers // Oct 2009

    Automated Selection of Legacy Systems SOA Modernization Strategies Using Decision Theory

    Legacy systems modernization is one of the most pressing issues for enterprise organizations. The continuous emergence of new technologies that are proven to be more robust, scalable, and maintainable, such as those using the Service Oriented Architectures (SOA), is currently attracting a lot of legacy systems modernization stakeholders. SOA legacy...

    Provided By American University in Cairo

  • White Papers // Jun 2009

    Pervasive Differentiated Services: A QoS Model for Pervasive Systems

    In this paper, authors introduce a mechanism by which the same concept of differentiated services used in network transmission can be applied to provide quality of service levels to pervasive systems applications. The classical DiffServ model, including marking and classification, assured forwarding, and expedited forwarding, are all utilized to create...

    Provided By American University in Cairo

  • White Papers // May 2009

    A Jabber Based Framework for Building Communication Capable Java Mobile Applications

    The main aim of this framework and library is to provide Java Micro Edition developers a powerful mechanism that facilitates the process of building communication capable mobile applications. The framework enables mobile devices to abstractly exchange streams of data using an underlying communication infrastructure, and also supports the continued connectivity...

    Provided By American University in Cairo

  • White Papers // Jun 2009

    Pervasive Differentiated Services: A QoS Model for Pervasive Systems

    In this paper, authors introduce a mechanism by which the same concept of differentiated services used in network transmission can be applied to provide quality of service levels to pervasive systems applications. The classical DiffServ model, including marking and classification, assured forwarding, and expedited forwarding, are all utilized to create...

    Provided By American University in Cairo

  • White Papers // Jan 2011

    A Locked Cache-Based Synchronization Protocol for CMP

    CMP processors are already replacing complex single core superscalar processor architectures. They offer better performance per watt and area. This is especially true in TLP rich server and web applications. Process / thread synchronization is important since CMP consists of multiple processor cores sharing cache resources including shared data structures....

    Provided By American University in Cairo

  • White Papers // Oct 2009

    Automated Selection of Legacy Systems SOA Modernization Strategies Using Decision Theory

    Legacy systems modernization is one of the most pressing issues for enterprise organizations. The continuous emergence of new technologies that are proven to be more robust, scalable, and maintainable, such as those using the Service Oriented Architectures (SOA), is currently attracting a lot of legacy systems modernization stakeholders. SOA legacy...

    Provided By American University in Cairo

  • White Papers // May 2009

    A Jabber Based Framework for Building Communication Capable Java Mobile Applications

    The main aim of this framework and library is to provide Java Micro Edition developers a powerful mechanism that facilitates the process of building communication capable mobile applications. The framework enables mobile devices to abstractly exchange streams of data using an underlying communication infrastructure, and also supports the continued connectivity...

    Provided By American University in Cairo

  • White Papers // Mar 2012

    Cognitive Multiple Access Using Soft Sensing and Secondary Channel State Information

    The authors consider a random access primary network. At the beginning of each time slot, a number of secondary users sense the channel and make an access decision based on the spectrum sensing outcome and the Channel State Information (CSI). Specifically, the channel is accessed by a secondary transmitter with...

    Provided By American University in Cairo

  • White Papers // Oct 2014

    On the Stable Throughput of Cooperative Cognitive Radio Networks with Finite Relaying Buffer

    In this paper, the authors study the problem of cooperative communications in cognitive radio systems where the secondary user has limited relaying room for the overheard primary packets. More specifically, they characterize the stable throughput region of a cognitive radio network with a finite relaying buffer at the secondary user....

    Provided By American University in Cairo