Sciweavers

1068 search results - page 171 / 214
» Group Dominant Strategies
Sort
View
DASFAA
2005
IEEE
136views Database» more  DASFAA 2005»
15 years 3 months ago
Distributed Intersection Join of Complex Interval Sequences
In many different application areas, e.g. space observation systems or engineering systems of world-wide operating companies, there is a need for an efficient distributed intersect...
Hans-Peter Kriegel, Peter Kunath, Martin Pfeifle, ...
EEE
2005
IEEE
15 years 3 months ago
A Pattern Language for Decentralized Coordination and Negotiation Protocols
Currently negotiation covers a huge and unstructured domain of negotiation- and coordination protocols and associated strategies. Researchers and practitioners like system enginee...
Adrian Paschke, Christine Kiss, Samer Al-Hunaty
MOBIQUITOUS
2005
IEEE
15 years 3 months ago
Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, cache consistency issues must be addressed. T...
Wensheng Zhang, Guohong Cao
WMTE
2005
IEEE
15 years 3 months ago
'Location is not enough!': an Empirical Study of Location-Awareness in Mobile Collaboration
: There is an ever growing number of mobile learning applications based on location-awareness, However, there is still a lack of information concerning how it might impact socio-co...
Nicolas Nova, Fabien Girardin, Pierre Dillenbourg
MM
2005
ACM
104views Multimedia» more  MM 2005»
15 years 3 months ago
Post-bit: embodied video contents on tiny stickies
Post-Bit is a small e-paper device modeled after paper PostIts r 1 . We explored and designed interfaces to handle multimedia contents with paper-like manipulations using this epa...
Takashi Matsumoto, Tony Dunnigan, Maribeth Back