Sciweavers

2092 search results - page 314 / 419
» A Theory of Non-Deterministic Networks
Sort
View
CORR
2008
Springer
115views Education» more  CORR 2008»
15 years 23 days ago
Playing With Population Protocols
Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous ...
Olivier Bournez, Jérémie Chalopin, J...
DBSEC
2009
163views Database» more  DBSEC 2009»
15 years 23 days ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
GECCO
2008
Springer
229views Optimization» more  GECCO 2008»
15 years 23 days ago
EIN-WUM: an AIS-based algorithm for web usage mining
With the ever expanding Web and the information published on it, effective tools for managing such data and presenting information to users based on their needs are becoming nece...
Adel Torkaman Rahmani, B. Hoda Helmi
MM
2010
ACM
175views Multimedia» more  MM 2010»
14 years 12 months ago
Subjective evaluation of scalable video coding for content distribution
This paper investigates the influence of the combination of the scalability parameters in scalable video coding (SVC) schemes on the subjective visual quality. We aim at providing...
Jong-Seok Lee, Francesca De Simone, Naeem Ramzan, ...
PODC
2010
ACM
14 years 12 months ago
Brief announcement: swarming secrets
We present information-theoretically secure schemes for sharing and modifying secrets among a dynamic swarm of computing devices. The schemes support an unlimited number of change...
Shlomi Dolev, Juan A. Garay, Niv Gilboa, Vladimir ...