Sciweavers

109 search results - page 14 / 22
» How to Make ad-hoc Polymorphism Less ad-hoc
Sort
View
ACISP
2006
Springer
15 years 3 months ago
Towards Provable Security for Ubiquitous Applications
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
Mike Burmester, Tri Van Le, Breno de Medeiros
ABIALS
2008
Springer
15 years 3 months ago
Anticipative Control of Voluntary Action: Towards a Computational Model
Abstract. Human action is goal-directed and must thus be guided by anticipations of wanted action effects. How anticipatory action control is possible and how it can emerge from ex...
Pascal Haazebroek, Bernhard Hommel
WDAG
2009
Springer
114views Algorithms» more  WDAG 2009»
15 years 4 months ago
Virtual Ring Routing Trends
Virtual Ring Routing (VRR) schemes were introduced in the context of wireless ad hoc networks and Internet anycast overlays. They build a network-routing layer using ideas from dis...
Dahlia Malkhi, Siddhartha Sen, Kunal Talwar, Renat...
MOBIHOC
2002
ACM
15 years 9 months ago
On the minimum node degree and connectivity of a wireless multihop network
This paper investigates two fundamental characteristics of a wireless multihop network: its minimum node degree and its k?connectivity. Both topology attributes depend on the spat...
Christian Bettstetter
TABLETOP
2006
IEEE
15 years 3 months ago
MultiSpace: Enabling Electronic Document Micro-mobility in Table-Centric, Multi-Device Environments
Although electronic media has changed how people interact with documents, today’s electronic documents and the environments in which they are used are still impoverished relativ...
Katherine Everitt, Chia Shen, Kathy Ryall, Clifton...