Sciweavers

3373 search results - page 161 / 675
» Naturalistic Decision Making
Sort
View
CORR
2011
Springer
155views Education» more  CORR 2011»
13 years 4 months ago
Subexponential convergence for information aggregation on regular trees
— We consider the decentralized binary hypothesis testing problem on trees of bounded degree and increasing depth. For a regular tree of depth t and branching factor k ≥ 2, we ...
Yashodhan Kanoria, Andrea Montanari
ICDE
2011
IEEE
274views Database» more  ICDE 2011»
13 years 27 days ago
SQPR: Stream query planning with reuse
—When users submit new queries to a distributed stream processing system (DSPS), a query planner must allocate physical resources, such as CPU cores, memory and network bandwidth...
Evangelia Kalyvianaki, Wolfram Wiesemann, Quang Hi...
PERCOM
2006
ACM
14 years 8 months ago
Introducing History-Enriched Security Context Transfer to Enhance the Security of Subsequent Handover
Many solutions for securing inter-provider handover proposed to date make use of the concept of security context transfer. However, none of these solutions addresses problems aris...
Ulrike Meyer, Susanne Wetzel
HICSS
2007
IEEE
95views Biometrics» more  HICSS 2007»
14 years 3 months ago
Protecting with Sensor Networks: Attention and Response
Sensor networks are expected to play an important role in hybrid protection infrastructures when combined with robots and human decision makers. In order to be effective, detectio...
Jeffrey V. Nickerson, Stephan Olariu
ECOWS
2007
Springer
14 years 3 months ago
Web Service Hosting and Revenue Maximization
An architecture of a hosting system is presented, where a number of servers are used to provide different types of web services to paying customers. There are charges for running ...
Michele Mazzucco, Isi Mitrani, Jennie Palmer, Mike...