Sciweavers

5793 search results - page 981 / 1159
» Individual communication complexity
Sort
View
P2P
2007
IEEE
165views Communications» more  P2P 2007»
14 years 4 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
ROMAN
2007
IEEE
115views Robotics» more  ROMAN 2007»
14 years 4 months ago
Issues in Human/Robot Task Structuring and Teaching
—Teaching a robot new skills may require that the teacher scaffolds the teaching experience appropriately. However, due to inherent assumptions made by a human teacher the scaffo...
Joe Saunders, Nuno Otero, Chrystopher L. Nehaniv
RTCSA
2007
IEEE
14 years 4 months ago
Activity-based Access Control Model to Hospital Information
Hospital work is characterized by the need to manage multiple activities simultaneously, constant local mobility, frequently interruptions, and intense collaboration and communica...
Le Xuan Hung, Sungyoung Lee, Young-Koo Lee, Heejo ...
RTSS
2007
IEEE
14 years 4 months ago
An Energy-Driven Design Methodology for Distributing DSP Applications across Wireless Sensor Networks
Wireless sensor network (WSN) applications have been studied extensively in recent years. Such applications involve resource-limited embedded sensor nodes that have small size and...
Chung-Ching Shen, William Plishker, Shuvra S. Bhat...
SASO
2007
IEEE
14 years 4 months ago
On Scaling Multi-Agent Task Reallocation Using Market-Based Approach
Multi-agent systems (MAS) provide a promising technology for addressing problems such as search and rescue missions, mine sweeping, and surveillance. These problems are a form of ...
Rajesh K. Karmani, Timo Latvala, Gul Agha