Sciweavers

1627 search results - page 191 / 326
» On context in authorization policy
Sort
View
CORR
2010
Springer
109views Education» more  CORR 2010»
13 years 10 months ago
Reputation-Based Attack-Resistant Cooperation Stimulation (RACS) For Mobile Ad hoc Networks
In mobile ad hoc networks (MANET), nodes usually belong to different authorities and pursue different goals. In order to maximize their own performance, nodes in such networks ten...
Anuradha Banerjee, Paramartha Dutta
COMCOM
2007
139views more  COMCOM 2007»
13 years 10 months ago
Performance evaluation of scheduling in IEEE 802.16 based wireless mesh networks
IEEE 802.16 employs TDMA (Time Division Multiple Access) as the access method and the policy for selecting scheduled links in a given time slot will definitely impact the system ...
Bo Han, Weijia Jia, Lidong Lin
JASIS
2007
119views more  JASIS 2007»
13 years 10 months ago
Visualization of the citation impact environments of scientific journals: An online mapping exercise
Aggregated journal-journal citation networks based on the Journal Citation Reports 2004 of the Science Citation Index (5968 journals) and the Social Science Citation Index (1712 j...
Loet Leydesdorff
AIM
2000
13 years 10 months ago
Probabilistic Algorithms in Robotics
This article describes a methodology for programming robots known as probabilistic robotics. The probabilistic paradigm pays tribute to the inherent uncertainty in robot perceptio...
Sebastian Thrun
CACM
2002
92views more  CACM 2002»
13 years 10 months ago
Probabilistic robotics
This article describes a methodology for programming robots known as probabilistic robotics. The probabilistic paradigm pays tribute to the inherent uncertainty in robot perceptio...
Sebastian Thrun