Sciweavers

2849 search results - page 34 / 570
» As We Should Have Thought
Sort
View
DC
2008
13 years 7 months ago
Contention-free MAC protocols for asynchronous wireless sensor networks
A MAC protocol specifies how nodes in a sensor network access a shared communication channel. Desired properties of a MAC protocol are: it should be contention-free (avoid collisio...
Costas Busch, Malik Magdon-Ismail, Fikret Sivrikay...
INFOCOM
2007
IEEE
14 years 1 months ago
Anonymous Tracking Using RFID Tags
Abstract—The increasing use of RFID tags in many applications have brought forth valid concerns of privacy and anonymity among users. One of the primary concerns with RFID tags i...
Murali S. Kodialam, Thyaga Nandagopal, Wing Cheong...
FOCS
2006
IEEE
14 years 1 months ago
Higher Lower Bounds for Near-Neighbor and Further Rich Problems
We convert cell-probe lower bounds for polynomial space into stronger lower bounds for near-linear space. Our technique applies to any lower bound proved through the richness meth...
Mihai Patrascu, Mikkel Thorup
HICSS
2005
IEEE
133views Biometrics» more  HICSS 2005»
14 years 1 months ago
Strategic Integration: A Knowledge Management Approach to Crisis Management
Every day, businesses are threatened by crises that could have been prevented or their impact lessened if only knowledge of causal and influencing factors were known and better ma...
Wei-Tsong Wang, Salvatore Belardo
CRIWG
2004
13 years 8 months ago
CreEx: A Framework for Creativity in Cooperative Problem Solving
Abstract. Creativity has become an important factor in recent years, as companies need to be able to quickly adapt to take advantage of new opportunities and handle fast paced chan...
Adriana Santarosa Vivacqua, Jano Moreira de Souza