Sciweavers

4207 search results - page 722 / 842
» Adaptive control allocation
Sort
View
PERCOM
2006
ACM
16 years 3 months ago
Context and Location-Aware Encryption for Pervasive Computing Environments
Pervasive computing promises to revolutionize computing, empower mobile users, and enhance mobility, customizability and adaptability of computing environments. Intrinsic to the n...
Jalal Al-Muhtadi, Raquel L. Hill, Roy H. Campbell,...
145
Voted
MOBISYS
2003
ACM
16 years 3 months ago
Collaboration and Multimedia Authoring on Mobile Devices
This paper introduces adaptation-aware editing and progressive update propagation, two novel mechanisms that enable authoring multimedia content and collaborative work on mobile d...
Eyal de Lara, Rajnish Kumar, Dan S. Wallach, Willy...
MOBIHOC
2001
ACM
16 years 3 months ago
A comparison of TCP performance over three routing protocols for mobile ad hoc networks
We examine the performance of the TCP protocol for bulkdata transfers in mobile ad hoc networks (MANETs). We vary the number of TCP connections and compare the performances of thr...
Thomas D. Dyer, Rajendra V. Boppana
HYBRID
2010
Springer
15 years 10 months ago
Accurate hybridization of nonlinear systems
This paper is concerned with reachable set computation for non-linear systems using hybridization. The essence of hybridization is to approximate a non-linear vector field by a s...
Thao Dang, Oded Maler, Romain Testylier
122
Voted
HICSS
2009
IEEE
114views Biometrics» more  HICSS 2009»
15 years 10 months ago
Reexamining Threat Rigidity: Implications for Design
Emergencies today seem larger, more complex, and unique than those of the past. Responding to them requires flexibility and creativity not easily achieved. The threat-rigidity the...
Linda Plotnick, Murray Turoff, Gerd Van Den Eede