Sciweavers

830 search results - page 104 / 166
» Generalizing Global Constraints Based on Network Flows
Sort
View
CONEXT
2007
ACM
14 years 22 days ago
The diameter of opportunistic mobile networks
Portable devices have more data storage and increasing communication capabilities everyday. In addition to classic infrastructure based communication, these devices can exploit hu...
Augustin Chaintreau, Abderrahmen Mtibaa, Laurent M...
MOBIHOC
2010
ACM
13 years 6 months ago
Barrier coverage with sensors of limited mobility
Barrier coverage is a critical issue in wireless sensor networks for various battlefield and homeland security applications. The goal is to effectively detect intruders that attem...
Anwar Saipulla, Benyuan Liu, Guoliang Xing, Xinwen...
AINA
2007
IEEE
14 years 24 days ago
Conflict Detection and Resolution in Context-Aware Authorization
Pervasive computing environments introduce new requirements in expressiveness and flexibility of access control policies which are almost addressable leveraging contextual informa...
Amir Reza Masoumzadeh, Morteza Amini, Rasool Jalil...
CP
2011
Springer
12 years 8 months ago
Hierarchically Nested Convex VCSP
We introduce tractable classes of VCSP instances based on convex cost functions. Firstly, we show that the class of VCSP instances satisfying the hierarchically nested convexity pr...
Martin C. Cooper, Stanislav Zivny
SIGUCCS
2003
ACM
14 years 2 months ago
Enforcing model network citizenship by remote administration
Higher education institutions have been striving to improve services and keep pace with new technologies. In a Higher education environment, the users utilize the available comput...
Prasun Gupta, Mahmoud Pegah