Sciweavers

15251 search results - page 2770 / 3051
» Network Science - Theory and Application
Sort
View
INFOCOM
2009
IEEE
15 years 11 months ago
Synchronized CSMA Contention: Model, Implementation and Evaluation
— A class of CSMA protocols used in a broad range of wireless applications uses synchronized contention where nodes periodically contend at intervals of fixed duration. While se...
Jing Shi, Ehsan Aryafar, Theodoros Salonidis, Edwa...
IPPS
2009
IEEE
15 years 11 months ago
Designing multi-leader-based Allgather algorithms for multi-core clusters
The increasing demand for computational cycles is being met by the use of multi-core processors. Having large number of cores per node necessitates multi-core aware designs to ext...
Krishna Chaitanya Kandalla, Hari Subramoni, Gopala...
UIC
2009
Springer
15 years 11 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
WEBI
2009
Springer
15 years 11 months ago
Social Semantics and Its Evaluation by Means of Semantic Relatedness and Open Topic Models
—This paper presents an approach using social semantics for the task of topic labelling by means of Open Topic Models. Our approach utilizes a social ontology to create an alignm...
Ulli Waltinger, Alexander Mehler
ATAL
2009
Springer
15 years 11 months ago
Maintenance-based trust for multi-agent systems
In last years, trust and reputation has been gaining increasing interest in multi-agent systems (MAS). To address this issue, we propose in this paper a maintenance-based trust me...
Babak Khosravifar, Maziar Gomrokchi, Jamal Bentaha...
« Prev « First page 2770 / 3051 Last » Next »