Sciweavers

2940 search results - page 442 / 588
» Behavioral Constraints for Services
Sort
View
MOBIHOC
2007
ACM
14 years 8 months ago
Secure incentives for commercial ad dissemination in vehicular networks
Vehicular ad hoc networks (VANETs) are envisioned to provide us with numerous interesting services in the near future. One of the most promising applications is the dissemination ...
Suk-Bok Lee, Gabriel Pan, Joon-Sang Park, Mario Ge...
ICCD
2004
IEEE
97views Hardware» more  ICCD 2004»
14 years 6 months ago
Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution
1 Many computer security threats involve execution of unauthorized foreign code on the victim computer. Viruses, network and email worms, Trojan horses, backdoor programs used in ...
A. Murat Fiskiran, Ruby B. Lee
CSCW
2010
ACM
14 years 6 months ago
Readers are not free-riders: reading as a form of participation on wikipedia
The success of Wikipedia as a large-scale collaborative effort has spurred researchers to examine the motivations and behaviors of Wikipedia’s participants. However, this resear...
Judd Antin, Coye Cheshire
SBP
2010
Springer
14 years 4 months ago
Social Factors in Creating an Integrated Capability for Health System Modeling and Simulation
Abstract. The health system is a complex system of systems – changes in agriculture, transportation, economics, family life, medical practices, and many other things can have a p...
Paul P. Maglio, Melissa Cefkin, Peter J. Haas, Pat...
ASIAMS
2009
IEEE
14 years 4 months ago
CSI Feedback Model in the Context of Adaptive Cognitive Radio Systems
Cognitive radio has the ability to sense the environment and adapt its behavior to optimize communication features, such as quality of service in the presence of interference and ...
Haleh Hosseini, Anis Izzati Ahmad Zamani, Sharifah...