Sciweavers

2503 search results - page 284 / 501
» Building Computer Network Attacks
Sort
View
AGENTS
2000
Springer
15 years 5 months ago
A game-theoretic formulation of multi-agent resource allocation
This paper considers resource allocation in a network with mobile agents competing for computational priority. We formulate this problem as a multi-agent game with the players bei...
Jonathan Bredin, Rajiv T. Maheswaran, Çagri...
HUMO
2000
Springer
15 years 5 months ago
Activity Monitoring and Summarization for an Intelligent Meeting Room
Intelligent meeting rooms should support efficient and effective interactions among its occupants. In this paper, we present our efforts toward building intelligent environments u...
Ivana Mikic, Kohsia S. Huang, Mohan M. Trivedi
81
Voted
TRIDENTCOM
2010
IEEE
14 years 11 months ago
Framework for IMS Service Scenario Implementation
This paper presents an experimental framework for implementation of an IMS/NGN reference service scenario by means of open source software. Multiple service enablers are deployed t...
Andrey Krendzel, Jawad Hussain, Josep Mangues-Bafa...
PERCOM
2011
ACM
14 years 5 months ago
A demonstration of PyViz, a flexible smart home visualization tool
—As smart home technologies continue to be deployed in research and real world environments, there continues to be a need for quality visualization of the smart home data. This d...
Brian L. Thomas, Aaron S. Crandall
106
Voted
AIMS
2009
Springer
15 years 8 months ago
Towards Cost-Aware Multipath Routing
Abstract. Traditional approaches to multipath routing ignore the economic incentives necessary in aligning both networks and users towards a common goal. While theory suggests cong...
João Taveira Araújo, Miguel Rio, Geo...