Sciweavers

1529 search results - page 276 / 306
» Energy-Based Models of P Systems
Sort
View
MOBILITY
2009
ACM
14 years 1 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
ICPP
1998
IEEE
14 years 23 days ago
Improving Parallel-Disk Buffer Management using Randomized Writeback
We address the problems of I/O scheduling and buffer management for general reference strings in a parallel I/O system. Using the standard parallel disk model withD disks and a sh...
Mahesh Kallahalla, Peter J. Varman
INFOCOM
1997
IEEE
14 years 21 days ago
Investigation of the IEEE 802.11 Medium Access Control (MAC)
Analysis of the drafi IEEE 802.11 wireless local area network (WLAN) standard is needed to characterize the expected performance of the standard’s ad hoc and infrastructure netw...
Brian P. Crow, Indra Widjaja, Jeong Geun Kim, Pres...
ISER
1997
Springer
202views Robotics» more  ISER 1997»
14 years 20 days ago
Interactive Visual and Force Rendering of Human-Knee Dynamics
The kinematics and force/displacement relationships of elements of biological joints are notoriously difficult to understand. In particular, the human knee has bearing surfaces o...
Randy E. Ellis, P. Zion, C. Y. Tso
KDD
2010
ACM
282views Data Mining» more  KDD 2010»
14 years 12 days ago
Optimizing debt collections using constrained reinforcement learning
In this paper, we propose and develop a novel approach to the problem of optimally managing the tax, and more generally debt, collections processes at financial institutions. Our...
Naoki Abe, Prem Melville, Cezar Pendus, Chandan K....