Sciweavers

4007 search results - page 289 / 802
» Computation with imprecise probabilities
Sort
View
ICDCS
2006
IEEE
15 years 10 months ago
Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks
In IEEE 802.11 based ad hoc networks, by simply manipulating the back-off timers and/or wait times prior to transmission, malicious nodes can cause a drastically reduced allocatio...
Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. ...
VTC
2006
IEEE
117views Communications» more  VTC 2006»
15 years 10 months ago
Simulation of Throughput in UMTS Networks with Different Spreading Factors
— We design and implement a local session1 admission control (SAC) algorithm for third-generation wireless networks which allows for the simulation of network throughput for diff...
Robert Akl, Anurag Arepally
OZCHI
2006
ACM
15 years 10 months ago
InfoScent evaluator: a semi-automated tool to evaluate semantic appropriateness of hyperlinks in a web site
In this paper, we present InfoScent Evaluator, a tool that automatically evaluates the semantic appropriateness of the descriptions of hyperlinks in web pages. The tool is based o...
Christos Katsanos, Nikolaos K. Tselios, Nikolaos M...
OZCHI
2006
ACM
15 years 10 months ago
Applying reach in direct manipulation user interfaces
The HCI community currently faces the problem of making tangible user interfaces actively responsive to their user’s current physical context. This paper explores the context of...
Aaron Toney, Bruce H. Thomas
FOCS
2005
IEEE
15 years 10 months ago
Sampling-based Approximation Algorithms for Multi-stage Stochastic
Stochastic optimization problems provide a means to model uncertainty in the input data where the uncertainty is modeled by a probability distribution over the possible realizatio...
Chaitanya Swamy, David B. Shmoys