Sciweavers

981 search results - page 139 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
STORAGESS
2005
ACM
15 years 10 months ago
Expecting the unexpected: adaptation for predictive energy conservation
The use of access predictors to improve storage device performance has been investigated for both improving access times, as well as a means of reducing energy consumed by the dis...
Jeffrey P. Rybczynski, Darrell D. E. Long, Ahmed A...
ATAL
2005
Springer
15 years 10 months ago
Fuzzy number approach to trust in coalition environment
General trust management model that we present is adapted for ad-hoc coalition environment, rather than for classic client-supplier relationship. The trust representation used in ...
Martin Rehák, Michal Pechoucek, Petr Benda
SIGMETRICS
2008
ACM
161views Hardware» more  SIGMETRICS 2008»
15 years 4 months ago
Noncooperative power control and transmission scheduling in wireless collision channels
We consider a wireless collision channel, shared by a finite number of mobile users who transmit to a common base station using a random access protocol. Mobiles are selfoptimizin...
Ishai Menache, Nahum Shimkin
CHI
2003
ACM
16 years 4 months ago
The mad hatter's cocktail party: a social mobile audio space supporting multiple simultaneous conversations
This paper presents a mobile audio space intended for use by gelled social groups. In face-to-face interactions in such social groups, conversational floors change frequently, e.g...
Paul M. Aoki, Matthew Romaine, Margaret H. Szymans...
ATAL
2008
Springer
15 years 6 months ago
Replacing the stop sign: unmanaged intersection control for autonomous vehicles
As computers inevitably begin to replace humans as the drivers of automobiles, our current human-centric traffic management mechanisms will give way to hyper-efficient systems and...
Mark Van Middlesworth, Kurt M. Dresner, Peter Ston...