Sciweavers

6110 search results - page 70 / 1222
» Graceful Network Operations
Sort
View
PERVASIVE
2005
Springer
14 years 3 months ago
Introducing Personal Operating Spaces for Ubiquitous Computing Environments
Pervasive computing environments will combine everyday physical spaces with network aware devices and services; hence providing computing behaviour that is much more entwined with...
Anuroop Shahi, Victor Callaghan, Michael Gardner
ICDCSW
2003
IEEE
14 years 3 months ago
Survivable Multi-Level Ad-Hoc Group Operations
In this paper we investigate the survivability of multilevel ad-hoc groups for critical operations through a case study. We aim to provide a formal trust framework for establishin...
Dan Zhou, Jie Wu
WSC
2008
13 years 12 months ago
Simulation of unit loading device inventory in airline operations
Commercial airlines often encounter imbalances in their inventory of unit loading devices (ULDs). A stochastic simulation model was developed to evaluate inventory policies. The s...
Chatabush Roongrat, Jay M. Rosenberger, Brian Huff
JOCN
2010
69views more  JOCN 2010»
13 years 4 months ago
Syntactic Unification Operations Are Reflected in Oscillatory Dynamics during On-line Sentence Comprehension
There is growing evidence suggesting that synchronization changes in the oscillatory neuronal dynamics in the EEG or MEG reflect the transient coupling and uncoupling of functiona...
Marcel C. M. Bastiaansen, Lilla Magyari, Peter Hag...
PERCOM
2007
ACM
14 years 9 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...