Sciweavers

7189 search results - page 1085 / 1438
» Connecting Design with Code
Sort
View
WMASH
2004
ACM
15 years 10 months ago
Reputation-based Wi-Fi deployment protocols and security analysis
In recent years, wireless Internet service providers (WISPs) have established thousands of WiFi hot spots in cafes, hotels and airports in order to offer to travelling Internet u...
Naouel Ben Salem, Jean-Pierre Hubaux, Markus Jakob...
AH
2004
Springer
15 years 10 months ago
Developing Active Learning Experiences for Adaptive Personalised eLearning
Developing adaptive, rich-media, eLearning courses tends to be a complex, highly-expensive and time-consuming task. A typical adaptive eLearning course will involve a multi-skilled...
Declan Dagger, Vincent P. Wade, Owen Conlan
157
Voted
AMAI
2004
Springer
15 years 10 months ago
Improving Exact Algorithms for MAX-2-SAT
We study three new techniques which will speed up the branch-and-bound algorithm for the MAX-2-SAT problem: The first technique is a new lower bound function for the algorithm an...
Haiou Shen, Hantao Zhang
146
Voted
AP2PC
2004
Springer
15 years 10 months ago
An Agent Module for a System on Mobile Devices
A Middleware is the software that assists an application to interact or communicate with other applications, networks, hardware, and/or operating systems. We have earlier proposed ...
Praveen Madiraju, Sushil K. Prasad, Rajshekhar Sun...
129
Voted
ESA
2004
Springer
91views Algorithms» more  ESA 2004»
15 years 10 months ago
Maximizing Throughput in Multi-queue Switches
We study a basic problem in Multi-Queue switches. A switch connects m input ports to a single output port. Each input port is equipped with an incoming FIFO queue with bounded cap...
Yossi Azar, Arik Litichevskey
« Prev « First page 1085 / 1438 Last » Next »