Sciweavers

366 search results - page 36 / 74
» Fremont: A System for Discovering Network Characteristics an...
Sort
View
CSCW
2002
ACM
13 years 7 months ago
NetWORKers and their Activity in Intensional Networks
Through ethnographic research, we document the rise of personal social networks in the workplace, which we call intensional networks. Paradoxically, we find that the most fundament...
Bonnie A. Nardi, Steve Whittaker, Heinrich Schwarz
CDC
2010
IEEE
106views Control Systems» more  CDC 2010»
13 years 2 months ago
Optimal cross-layer wireless control policies using TD learning
We present an on-line crosslayer control technique to characterize and approximate optimal policies for wireless networks. Our approach combines network utility maximization and ad...
Sean P. Meyn, Wei Chen, Daniel O'Neill
APWEB
2003
Springer
14 years 29 days ago
An Ant Algorithm Based Dynamic Routing Strategy for Mobile Agents
Routing strategy is one of the most important aspects in a mobile agent system, which is a complex combinatorial problem. Most of current mobile agent systems adopt static routing ...
Dan Wang, Ge Yu, Mingsong Lv, Baoyan Song, Derong ...
TSE
2010
230views more  TSE 2010»
13 years 2 months ago
Vulnerability Discovery with Attack Injection
The increasing reliance put on networked computer systems demands higher levels of dependability. This is even more relevant as new threats and forms of attack are constantly being...
João Antunes, Nuno Ferreira Neves, Miguel C...
DEXAW
2002
IEEE
118views Database» more  DEXAW 2002»
14 years 21 days ago
From Location Databases to Pervasive Catalog
One characteristic of the next generation wireless mobile environments is a high level of interoperability between mobile applications and services. This imposes significant dema...
Panos K. Chrysanthis, Vladimir Zadorozhny