Sciweavers

2031 search results - page 335 / 407
» Natural Evolution Strategies
Sort
View
DSN
2005
IEEE
15 years 10 months ago
Neutralization of Errors and Attacks in Wireless Ad Hoc Networks
This paper proposes and evaluates strategies to build reliable and secure wireless ad hoc networks. Our contribution is based on the notion of inner-circle consistency, where loca...
Claudio Basile, Zbigniew Kalbarczyk, Ravishankar K...
HICSS
2005
IEEE
370views Biometrics» more  HICSS 2005»
15 years 10 months ago
Strategic Information Technology Management: Managing Organizational, Political, and Technological Forces
This paper explores the role of Information Technology (IT) in the management of municipally-owned and operated public utilities. Through semi-structured interviews of senior mana...
Keith Schildt, Suzanne Beaumaster, Marcie Edwards
INFOCOM
2005
IEEE
15 years 10 months ago
Cooperation and decision-making in a wireless multi-provider setting
— In this paper we investigate network design for a wireless service provider using two orthogonal technologies: a WAN technology with uniform spatial coverage and set of LAN acc...
Alex Zemlianov, Gustavo de Veciana
IPPS
2005
IEEE
15 years 10 months ago
A Cross-Layer Approach for Power-Performance Optimization in Distributed Mobile Systems
The next generation of mobile systems with multimedia processing capabilities and wireless connectivity will be increasingly deployed in highly dynamic and distributed environment...
Shivajit Mohapatra, Radu Cornea, Hyunok Oh, Kyoung...
ISM
2005
IEEE
159views Multimedia» more  ISM 2005»
15 years 10 months ago
Avatar-centric Risk Evaluation
Hazard detection and prevention of natural and manmade disasters at critical civil infrastructure is becoming increasingly important. Recent events, such as earthquakes and terror...
Maria-Cruz Villa-Uriol, Falko Kuester, Oscar Garc&...