Sciweavers

2722 search results - page 422 / 545
» Hastily formed networks
Sort
View
DSN
2003
IEEE
14 years 4 months ago
Human-Machine Diversity in the Use of Computerised Advisory Systems: A Case Study
Computer-based advisory systems form with their users composite, human-machine systems. Redundancy and diversity between the human and the machine are often important for the depe...
Lorenzo Strigini, Andrey Povyakalo, Eugenio Alberd...
DSN
2003
IEEE
14 years 4 months ago
Opportunity-Adaptive QoS Enhancement in Satellite Constellations: A Case Study
Systems that are formed by massively distributed mobile resources, such as satellite constellations, often provide mission-critical functions. However, many existing quality-of-se...
Ann T. Tai, Kam S. Tso, Leon Alkalai, Savio N. Cha...
INFOCOM
2003
IEEE
14 years 4 months ago
Unreliable Sensor Grids: Coverage, Connectivity and Diameter
Abstract— We consider an unreliable wireless sensor gridnetwork with n nodes placed in a square of unit area. We are interested in the coverage of the region and the connectivity...
Sanjay Shakkottai, R. Srikant, Ness B. Shroff
NDSS
2003
IEEE
14 years 4 months ago
Moderately Hard, Memory-Bound Functions
A resource may be abused if its users incur little or no cost. For example, e-mail abuse is rampant because sending an e-mail has negligible cost for the sender. It has been sugge...
Martín Abadi, Michael Burrows, Ted Wobber
PERCOM
2003
ACM
14 years 4 months ago
Interaction in Pervasive Computing Settings Using Bluetooth-Enabled Active Tags and Passive RFID Technology Together with Mobile
Passive RFID technology and unobtrusive Bluetoothenabled active tags are means to augment products and everyday objects with information technology invisible to human users. This ...
Frank Siegemund, Christian Floerkemeier