Sciweavers

658 search results - page 113 / 132
» Evaluation of alternative presentation control techniques
Sort
View
WISEC
2009
ACM
14 years 2 months ago
Securing network access in wireless sensor networks
In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In t...
Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas M...
OTM
2009
Springer
14 years 2 months ago
TMBean: Optimistic Concurrency in Application Servers Using Transactional Memory
Abstract. In this experience report, we present an evaluation of different techniques to manage concurrency in the context of application servers. Traditionally, using entity beans...
Lucas Charles, Pascal Felber, Christophe Gêt...
NIPS
2004
13 years 9 months ago
Theories of Access Consciousness
Theories of access consciousness address how it is that some mental states but not others are available for evaluation, choice behavior, and verbal report. Farah, O'Reilly, a...
Michael D. Colagrosso, Michael C. Mozer
CCE
2008
13 years 7 months ago
A hierarchical decision procedure for productivity innovation in large-scale petrochemical processes
Maintaining the best quality is essential for the survival of a company in a globally competitive world. Six Sigma activity has been widely accepted as one of the most efficient a...
Chonghun Han, Minjin Kim, En Sup Yoon
DAC
2001
ACM
14 years 8 months ago
Power-Aware Scheduling under Timing Constraints for Mission-Critical Embedded Systems
Power-aware systems are those that must make the best use of available power. They subsume traditional low-power systems in that they must not only minimize power when the budget ...
Jinfeng Liu, Pai H. Chou, Nader Bagherzadeh, Fadi ...