Sciweavers

3179 search results - page 430 / 636
» Applications of PCF Theory
Sort
View
CHI
2010
ACM
14 years 4 months ago
Using reinforcement to strengthen users' secure behaviors
Users have a strong tendency toward dismissing security dialogs unthinkingly. Prior research has shown that users' responses to security dialogs become significantly more tho...
Ricardo Villamarín-Salomón, Jos&eacu...
EVOW
2010
Springer
14 years 4 months ago
WiMAX Network Planning Using Adaptive-Population-Size Genetic Algorithm
Abstract. IEEE 802.16, also known as WiMAX, is a new wireless access technology for currently increasing demand of wireless high-speed broadband service. Efficient and effective d...
Ting Hu, Yuanzhu Peter Chen, Wolfgang Banzhaf
MOBIHOC
2009
ACM
14 years 4 months ago
Low-connectivity and full-coverage three dimensional wireless sensor networks
Low-connectivity and full-coverage three dimensional Wireless Sensor Networks (WSNs) have many real-world applications. By low connectivity, we mean there are at least k disjoint ...
Xiaole Bai, Chuanlin Zhang, Dong Xuan, Jin Teng, W...
HIPEAC
2009
Springer
14 years 4 months ago
Finding Stress Patterns in Microprocessor Workloads
Power consumption has emerged as a key design concern across the entire computing range, from low-end embedded systems to high-end supercomputers. Understanding the power character...
Frederik Vandeputte, Lieven Eeckhout
IPSN
2009
Springer
14 years 4 months ago
Automating rendezvous and proxy selection in sensornets
As the diversity of sensornet use cases increases, the combinations of environments and applications that will coexist will make custom engineering increasingly impractical. We in...
David Chu, Joseph M. Hellerstein