Sciweavers

659 search results - page 124 / 132
» Using formal models to design user interfaces: a case study
Sort
View
MSWIM
2005
ACM
14 years 1 months ago
Getting urban pedestrian flow from simple observation: realistic mobility generation in wireless network simulation
In order for precise evaluation of MANET applications, more realistic mobility models are needed in wireless network simulations. In this paper, we focus on the behavior of pedest...
Kumiko Maeda, Kazuki Sato, Kazuki Konishi, Akiko Y...
CISS
2007
IEEE
14 years 1 months ago
Cooperation Strategies for Two Co-located receivers, with no CSI at the transmitter
— We study the case of a single transmitter, which communicates to two co-located users, through an independent block Rayleigh fading channel. The co-location nature of the users...
Amichai Sanderovich, Avi Steiner, Shlomo Shamai
CASSIS
2004
Springer
14 years 26 days ago
ESC/Java2: Uniting ESC/Java and JML
The ESC/Java tool was a lauded advance in effective static checking of realistic Java programs, but has become out-of-date with respect to Java and the Java Modeling Language (JML...
David R. Cok, Joseph Kiniry
SSD
2007
Springer
189views Database» more  SSD 2007»
14 years 1 months ago
Collaborative Spatial Data Sharing Among Mobile Lightweight Devices
Abstract. Mobile devices are increasingly being equipped with wireless peerto-peer (P2P) networking interfaces, rendering the sharing of data among mobile devices feasible and bene...
Zhiyong Huang, Christian S. Jensen, Hua Lu, Beng C...
CODASPY
2011
12 years 11 months ago
Relationship-based access control: protection model and policy language
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
Philip W. L. Fong