Sciweavers

2612 search results - page 124 / 523
» Mobile Processes and Termination
Sort
View
VTC
2007
IEEE
132views Communications» more  VTC 2007»
14 years 3 months ago
Collaborative Information Revelation and Collusion in "Word-of-Mouth" Access Selection Schemes
— “Word-of-Mouth”, a novel scheme for sharing the service quality experienced with different local networks, is presented and evaluated as a distributed solution for performi...
Pietro Lungaro
GECCO
2010
Springer
211views Optimization» more  GECCO 2010»
13 years 10 months ago
Investigating EA solutions for approximate KKT conditions in smooth problems
Evolutionary algorithms (EAs) are increasingly being applied to solve real-parameter optimization problems due to their flexibility in handling complexities such as non-convexity,...
Rupesh Tulshyan, Ramnik Arora, Kalyanmoy Deb, Joyd...
CHI
2007
ACM
14 years 9 months ago
Designing mobile phone interface with children
This paper presents the design and evaluation of a mobile phone interface with and for children. Ten children aged 8-13 years old took part in a participatory design process and t...
Xiaowei Cao, Sri Hastuti Kurniawan
MOBIHOC
2002
ACM
14 years 8 months ago
Performance evaluation of a fair backoff algorithm for IEEE 802.11 DFWMAC
Due to hidden terminals and a dynamic topology, contention among stations in an ad-hoc network is not homogeneous. Some stations are at a disadvantage in opportunity of access to ...
Zuyuan Fang, Brahim Bensaou, Yu Wang
WOWMOM
2009
ACM
151views Multimedia» more  WOWMOM 2009»
14 years 3 months ago
Distributed user authentication in wireless LANs
—An increasing number of mobile devices, including smartphones, use WLAN for accessing the Internet. Existing WLAN authentication mechanisms are either disruptive, such as presen...
Dmitriy Kuptsov, Andrey Khurri, Andrei Gurtov