Sciweavers

8658 search results - page 1723 / 1732
» Models of Command and Control
Sort
View
UMUAI
2010
107views more  UMUAI 2010»
13 years 6 months ago
PERSONAF: framework for personalised ontological reasoning in pervasive computing
Abstract. Pervasive computing creates possibilities for presenting highly personalised information about the people, places and things in a building. One of the challenges for such...
William T. Niu, Judy Kay
WINET
2010
97views more  WINET 2010»
13 years 6 months ago
Routing in the frequency domain
Abstract The design of single transceiver based multichannel multi-hop wireless mesh networks focuses on the trade-off between rapid neighbor synchronization and maximizing the usa...
Jay A. Patel, Haiyun Luo, Indranil Gupta
CCS
2010
ACM
13 years 5 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
CODES
2010
IEEE
13 years 5 months ago
Statistical approach in a system level methodology to deal with process variation
The impact of process variation in state of the art technology makes traditional (worst case) designs unnecessarily pessimistic, which translates to suboptimal designs in terms of...
Concepción Sanz Pineda, Manuel Prieto, Jos&...
ADHOCNOW
2009
Springer
13 years 5 months ago
A Decentralized Approach to Minimum-Energy Broadcasting in Static Ad Hoc Networks
Broadcasting is a commonly used feature in wireless networking, e.g. for file distribution, re-tasking, event notification, or miscellaneous maintenance. Due to the limited resourc...
Christopher Miller, Christian Poellabauer
« Prev « First page 1723 / 1732 Last » Next »