Sciweavers

742 search results - page 45 / 149
» Argumentative alternating offers
Sort
View
HICSS
2009
IEEE
146views Biometrics» more  HICSS 2009»
15 years 6 months ago
Open Access to Scientific Literature - Increasing Citations as an Incentive for Authors to Make Their Publications Freely Access
In recent years the scientific journal market faces significant evolutions that may cause major changes in the way of publishing research results. In this connection, open access ...
Steffen Bernius, Matthias Hanauske
KBSE
2009
IEEE
15 years 6 months ago
Symbolic Deadlock Analysis in Concurrent Libraries and Their Clients
Methods in object-oriented concurrent libraries hide internal synchronization details. However, information hiding may result in clients causing thread safety violations by invoki...
Jyotirmoy V. Deshmukh, E. Allen Emerson, Sriram Sa...
CDC
2008
IEEE
114views Control Systems» more  CDC 2008»
15 years 6 months ago
Stability of node-based multipath routing and dual congestion control
— This paper considers a network flow control problem where routing and input rates are controlled in a decentralized way across a network, to optimize a global welfare objectiv...
Enrique Mallada, Fernando Paganini
IROS
2007
IEEE
108views Robotics» more  IROS 2007»
15 years 6 months ago
Hiding the acoustic signature of a mobile robot
—A mobile robot can be a rather significant source of noise: noisy fans cool onboard computers, motors are spinning, rubber wheels are squeaking against the floor, and mechanical...
Eric Martinson
CCS
2007
ACM
15 years 6 months ago
Detecting relay attacks with timing-based protocols
Distance bounding protocols have been proposed as means of detecting relay attacks, also known as mafia fraud. In this paper we present the first symmetric key based distance bou...
Jason Reid, Juan Manuel González Nieto, Tee...