Sciweavers

2612 search results - page 477 / 523
» Mobile Processes and Termination
Sort
View
SRDS
1999
IEEE
14 years 1 months ago
An Adaptive Checkpointing Protocol to Bound Recovery Time with Message Logging
Numerous mathematical approaches have been proposed to determine the optimal checkpoint interval for minimizing total execution time of an application in the presence of failures....
Kuo-Feng Ssu, Bin Yao, W. Kent Fuchs
KI
1999
Springer
14 years 1 months ago
Agents in Traffic Modelling - From Reactive to Social Behaviour
In modern societies the demand for mobility is increasing daily. Hence, one challenge to researchers dealing with traffic and transportation is to find efficient ways to model and ...
Ana L. C. Bazzan, Joachim Wahle, Franziska Klü...
IATA
1998
Springer
14 years 1 months ago
Agent-Based Schemes for Plug-And-Play Network Components
In this paper, we present several approaches to making the process of configuring network devices easier than is currently the case. Configuring a device requires that a number of ...
Andrzej Bieszczad, Syed Kamran Raza, Bernard Pagur...
EUROMICRO
1997
IEEE
14 years 1 months ago
The Harpoon security system for helper programs on a Pocket Companion
In this paper we present a security framework for executing foreign programs, called helpers, on a Pocket Companion: a wireless hand-held computer. A helper program as proposed is...
Gerard J. M. Smit, Paul J. M. Havinga, Daniël...
FGR
1996
IEEE
186views Biometrics» more  FGR 1996»
14 years 1 months ago
Dynamical system representation, generation, and recognition of basic oscillatory motion gestures
We present a system for generation and recognition of oscillatory gestures. Inspired by gestures used in two representative human-tohuman control areas, we consider a set of oscil...
Charles J. Cohen, Lynn Conway, Daniel E. Koditsche...