Sciweavers

4600 search results - page 909 / 920
» How to Make
Sort
View
TIFS
2010
130views more  TIFS 2010»
13 years 4 months ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena
TVCG
2010
151views more  TVCG 2010»
13 years 4 months ago
Interactive Visual Analysis of Multiple Simulation Runs Using the Simulation Model View: Understanding and Tuning of an Electron
Multiple simulation runs using the same simulation model with different values of control parameters usually generate large data sets that capture the variational aspects of the be...
Kresimir Matkovic, Denis Gracanin, Mario Jelovic, ...
CORR
2011
Springer
217views Education» more  CORR 2011»
13 years 1 months ago
Interactive Execution Monitoring of Agent Teams
There is an increasing need for automated support for humans monitoring the activity of distributed teams of cooperating agents, both human and machine. We characterize the domain...
Pauline Berry, Thomas J. Lee, David E. Wilkins
INFOCOM
2011
IEEE
13 years 1 months ago
Throughput and delay scaling of general cognitive networks
—There has been recent interest within the networking research community to understand how performance scales in cognitive networks with overlapping n primary nodes and m seconda...
Wentao Huang, Xinbing Wang
ASPLOS
2011
ACM
13 years 1 months ago
Pocket cloudlets
Cloud services accessed through mobile devices suffer from high network access latencies and are constrained by energy budgets dictated by the devices’ batteries. Radio and batt...
Emmanouil Koukoumidis, Dimitrios Lymberopoulos, Ka...