Sciweavers

2261 search results - page 412 / 453
» Dynamic types for authentication
Sort
View
SYSTOR
2009
ACM
14 years 3 months ago
DHIS: discriminating hierarchical storage
A typical storage hierarchy comprises of components with varying performance and cost characteristics, providing multiple options for data placement. We propose and evaluate a hie...
Chaitanya Yalamanchili, Kiron Vijayasankar, Erez Z...
W4A
2009
ACM
14 years 3 months ago
Audio presentation of auto-suggest lists
One of the most significant advances behind World Wide Web (Web) 2.0 is the ability to allow parts of a Web page to be updated independently. This can provide an exciting, intera...
Andy Brown, Caroline Jay, Simon Harper
CDC
2008
IEEE
142views Control Systems» more  CDC 2008»
14 years 3 months ago
Convergence of rule-of-thumb learning rules in social networks
— We study the problem of dynamic learning by a social network of agents. Each agent receives a signal about an underlying state and communicates with a subset of agents (his nei...
Daron Acemoglu, Angelia Nedic, Asuman E. Ozdaglar
GLOBECOM
2008
IEEE
14 years 3 months ago
Distributed Spectrum Allocation of Delay-Sensitive Users over Multi-User Multi-Carrier Networks
—In this paper, we study the distributed spectrum allocation for autonomous users transmitting delay-sensitive information over a wireless multi-carrier network. Because there is...
Wenchi Tu, Mihaela van der Schaar
INFOCOM
2008
IEEE
14 years 3 months ago
iBubble: Multi-Keyword Routing Protocol for Heterogeneous Wireless Sensor Networks
— Many tasks require multiple sensing capabilities; in Wireless Sensor Networks (WSN), it is expensive to deploy a homogeneous network wherein every sensor has the same functiona...
Xiaoming Lu, Matt Spear, Karl N. Levitt, Shyhtsun ...