Sciweavers

2763 search results - page 3 / 553
» The Dangerous 'All' in Specifications
Sort
View
WDAG
2007
Springer
105views Algorithms» more  WDAG 2007»
14 years 1 months ago
Rendezvous of Mobile Agents in Unknown Graphs with Faulty Links
A group of identical mobile agents moving asynchronously among the nodes of an anonymous network have to gather together in a single node of the graph. This problem known as the (a...
Jérémie Chalopin, Shantanu Das, Nico...
ISPEC
2005
Springer
14 years 1 months ago
An Email Worm Vaccine Architecture
We present an architecture for detecting “zero-day” worms and viruses in incoming email. Our main idea is to intercept every incoming message, prescan it for potentially danger...
Stelios Sidiroglou, John Ioannidis, Angelos D. Ker...
FIRSTMONDAY
2008
60views more  FIRSTMONDAY 2008»
13 years 7 months ago
Opening Pandora's box: How technologies of communication and cognition may be shifting towards a 'psycho-civilized society'
Increasingly there are indications that the uses of wireless technologies have been developed to target an individual's biological body, with specific focus upon the neuronal...
Kingsley L. Dennis
HUC
2009
Springer
14 years 13 days ago
It's not all about "Green": energy use in low-income communities
Personal energy consumption, specifically home energy consumption such as heating, cooling, and electricity, has been an important environmental and economic topic for decades. De...
Tawanna Dillahunt, Jennifer Mankoff, Eric Paulos, ...
MIS
2008
Springer
191views Multimedia» more  MIS 2008»
13 years 7 months ago
QoS management and control for an all-IP WiMAX network architecture: Design, implementation and evaluation
The IEEE 802.16 standard provides a specification for a fixed and mobile broadband wireless access system, offering high data rate transmission of multimedia services with differen...
Thomas Michael Bohnert, Marco Castrucci, Nicola Ci...