University of Le Havre

Displaying 1-6 of 6 results

  • White Papers // May 2013

    Impact of Secondary Service Optimal Power Allocation on Cognitive Radio Systems

    In cognitive radio systems, the secondary user senses a spectrum band formally allocated to the primary user and utilizes free spectrum bands or white spaces for its transmissions. In this paper, the effect of secondary service optimal power allocation on cognitive radio systems has been investigated. They have formulated and...

    Provided By University of Le Havre

  • White Papers // Oct 2012

    Enhancing Grid Security Using Quantum Key Distribution

    Quantum Key Distribution (QKD) is a secure key distribution technology, which provides information theoretic or unconditional security. BBN DARPA quantum network and SECOQC network of secrets are the examples of such networks. Research is also in progress for the integration of QKD with the protocols in different layers of OSI...

    Provided By University of Le Havre

  • White Papers // Apr 2012

    Aggregating Digital Traces Into a Semantic-Enriched Data Cloud for Informal Learning

    Modern informal learning models require linking experiences in the training environments with experiences in the real-world. However, data about real-world experiences is notoriously hard to collect. Social spaces bring new opportunities to tackle this challenge, supplying digital traces where people talk about their real-world experiences, which can become valuable resource,...

    Provided By University of Le Havre

  • White Papers // Jan 2010

    Management of QoS and Data Freshness in RTDBSs' Using Feedback Control Scheduling and Data Versions

    These recent years, a lot of real-time applications are becoming increasingly sophisticated in their data needs, resulting in a greater demand for real-time data services. Real-Time Database Systems (RTDBS) can manage these applications, but the workload in these systems is unpredictable, then RTDBS may become overloaded. A lot of work...

    Provided By University of Le Havre

  • White Papers // Nov 2009

    Impact of Obstacles on the Degree of Mobile Ad Hoc Connection Graphs

    What is the impact of obstacles on the graphs of connections between stations in Mobile Ad hoc Networks? In order to answer, at least partially, this question, the first step is to define both an environment with obstacles and a mobility model for the stations in such an environment. The...

    Provided By University of Le Havre

  • White Papers // Oct 2009

    Security as a Selective Project

    Security is a selective project that is typically understood, produced and expressed in terms of differentiation and exclusion; it is rarely for all. This is notably so in post-conflict cities such as Baghdad and Basra, where the principal political weapons are coercion and intimidation, territoriality is a significant facet of...

    Provided By University of Le Havre

  • White Papers // Jan 2010

    Management of QoS and Data Freshness in RTDBSs' Using Feedback Control Scheduling and Data Versions

    These recent years, a lot of real-time applications are becoming increasingly sophisticated in their data needs, resulting in a greater demand for real-time data services. Real-Time Database Systems (RTDBS) can manage these applications, but the workload in these systems is unpredictable, then RTDBS may become overloaded. A lot of work...

    Provided By University of Le Havre

  • White Papers // May 2013

    Impact of Secondary Service Optimal Power Allocation on Cognitive Radio Systems

    In cognitive radio systems, the secondary user senses a spectrum band formally allocated to the primary user and utilizes free spectrum bands or white spaces for its transmissions. In this paper, the effect of secondary service optimal power allocation on cognitive radio systems has been investigated. They have formulated and...

    Provided By University of Le Havre

  • White Papers // Oct 2009

    Security as a Selective Project

    Security is a selective project that is typically understood, produced and expressed in terms of differentiation and exclusion; it is rarely for all. This is notably so in post-conflict cities such as Baghdad and Basra, where the principal political weapons are coercion and intimidation, territoriality is a significant facet of...

    Provided By University of Le Havre

  • White Papers // Nov 2009

    Impact of Obstacles on the Degree of Mobile Ad Hoc Connection Graphs

    What is the impact of obstacles on the graphs of connections between stations in Mobile Ad hoc Networks? In order to answer, at least partially, this question, the first step is to define both an environment with obstacles and a mobility model for the stations in such an environment. The...

    Provided By University of Le Havre

  • White Papers // Oct 2012

    Enhancing Grid Security Using Quantum Key Distribution

    Quantum Key Distribution (QKD) is a secure key distribution technology, which provides information theoretic or unconditional security. BBN DARPA quantum network and SECOQC network of secrets are the examples of such networks. Research is also in progress for the integration of QKD with the protocols in different layers of OSI...

    Provided By University of Le Havre

  • White Papers // Apr 2012

    Aggregating Digital Traces Into a Semantic-Enriched Data Cloud for Informal Learning

    Modern informal learning models require linking experiences in the training environments with experiences in the real-world. However, data about real-world experiences is notoriously hard to collect. Social spaces bring new opportunities to tackle this challenge, supplying digital traces where people talk about their real-world experiences, which can become valuable resource,...

    Provided By University of Le Havre