Sciweavers

10797 search results - page 2157 / 2160
» Robust control applications
Sort
View
DCOSS
2011
Springer
12 years 9 months ago
Planning the trajectories of multiple mobile sinks in large-scale, time-sensitive WSNs
—Controlled sink mobility has been shown to be very beneficial in lifetime prolongation of wireless sensor networks (WSNs) by avoiding the typical hot-spot problem near the sink...
Wint Yi Poe, Michael Beck, Jens B. Schmitt
TEI
2012
ACM
225views Hardware» more  TEI 2012»
12 years 5 months ago
On-body interaction: armed and dangerous
Recent technological advances in input sensing, as well as ultra-small projectors, have opened up new opportunities for interaction – the use of the body itself as both an input...
Chris Harrison, Shilpa Ramamurthy, Scott E. Hudson
VEE
2012
ACM
218views Virtualization» more  VEE 2012»
12 years 5 months ago
Enhancing TCP throughput of highly available virtual machines via speculative communication
Checkpoint-recovery based virtual machine (VM) replication is an attractive technique for accommodating VM installations with high-availability. It provides seamless failover for ...
Balazs Gerofi, Yutaka Ishikawa
BPM
2005
Springer
228views Business» more  BPM 2005»
14 years 3 months ago
Risk Management in the BPM Lifecycle
Business Process Management is considered an essential strategy to create and maintain competitive advantage by streamlining and monitoring corporate processes. While the identific...
Michael zur Muehlen, Danny Ting-Yi Ho
SIGCOMM
2012
ACM
12 years 7 days ago
Abstractions for network update
ions for Network Update Mark Reitblatt Cornell Nate Foster Cornell Jennifer Rexford Princeton Cole Schlesinger Princeton David Walker Princeton Configuration changes are a common...
Mark Reitblatt, Nate Foster, Jennifer Rexford, Col...
« Prev « First page 2157 / 2160 Last » Next »