Sciweavers

1472 search results - page 272 / 295
» Access control in virtual environments
Sort
View
WICON
2010
14 years 9 months ago
On Infostation Density of Vehicular Networks
Vehicle-to-Vehicle and Vehicle-to-Roadside communications are going to become an indispensable part of the modern day automotive experience. For people on the move, vehicular netwo...
Vinod Kone, Haitao Zheng, Antony I. T. Rowstron, B...
ICML
2008
IEEE
16 years 17 days ago
Reinforcement learning in the presence of rare events
We consider the task of reinforcement learning in an environment in which rare significant events occur independently of the actions selected by the controlling agent. If these ev...
Jordan Frank, Shie Mannor, Doina Precup
76
Voted
ICSE
2007
IEEE-ACM
15 years 12 months ago
Managing Impacts of Security Protocol Changes in Service-Oriented Applications
We present a software tool and a framework for security protocol change management. While we focus on trust negotiation protocols in this paper, many of the ideas are generally ap...
Halvard Skogsrud, Boualem Benatallah, Fabio Casati...
NETCOOP
2009
Springer
15 years 6 months ago
Probabilistic Analysis of Hierarchical Cluster Protocols for Wireless Sensor Networks
Wireless sensor networks are designed to extract data from the deployment environment and combine sensing, data processing and wireless communication to provide useful information ...
Ingemar Kaj
CSE
2008
IEEE
15 years 6 months ago
Energy Model for H2S Monitoring Wireless Sensor Network
Abstract— Several applications have been proposed for Wireless sensor networks. These include habitat monitoring, structural health monitoring, pipeline (gas, water, and oil) mon...
Xiaojuan Chao, Waltenegus Dargie, Lin Guan