Sciweavers

8658 search results - page 1645 / 1732
» Models of Command and Control
Sort
View
IMCS
2007
77views more  IMCS 2007»
13 years 7 months ago
Incident response requirements for distributed security information management systems
Purpose – Security information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by co...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...
TMC
2008
134views more  TMC 2008»
13 years 7 months ago
A Hybrid Token-CDMA MAC Protocol for Wireless Ad Hoc Networks
Token passing medium access control (MAC) protocols are gaining interest amongst wireless ad hoc network researchers as they provide unrivalled advantages over the existing IEEE 80...
I-Sheng Liu, Fambirai Takawira, Hong-Jun Xu
TOG
2008
171views more  TOG 2008»
13 years 7 months ago
3D unsharp masking for scene coherent enhancement
We present a new approach for enhancing local scene contrast by unsharp masking over arbitrary surfaces under any form of illumination. Our adaptation of a well-known 2D technique...
Tobias Ritschel, Kaleigh Smith, Matthias Ihrke, Th...
JPDC
2007
209views more  JPDC 2007»
13 years 7 months ago
Application-aware integration of data collection and power management in wireless sensor networks
Sensors are typically deployed to gather data about the physical world and its artifacts for a variety of purposes that range from environment monitoring, control, to data analysi...
Qi Han, Sharad Mehrotra, Nalini Venkatasubramanian
AAMAS
2002
Springer
13 years 7 months ago
Adapting Populations of Agents
We control a population of interacting software agents. The agents have a strategy, and receive a payoff for executing that strategy. Unsuccessful agents become extinct. We investi...
Philippe De Wilde, Maria Chli, Luís Correia...
« Prev « First page 1645 / 1732 Last » Next »