Sciweavers

4118 search results - page 740 / 824
» Mechanisms for usage control
Sort
View
IMC
2005
ACM
15 years 5 months ago
Facilitating Access Point Selection in IEEE 802.11 Wireless Networks
The performance experienced by wireless clients in IEEE 802.11 wireless networks heavily depends on the clients’ ability to identify the Access Point (AP) that will offer the be...
Sudarshan Vasudevan, Konstantina Papagiannaki, Chr...
EURONGI
2005
Springer
15 years 5 months ago
Receiver Oriented Trajectory Based Forwarding
Abstract— Trajectory Based Forwarding (TBF) is a new approach to routing in ad hoc wireless networks. It exploits node position information and, similarly to source routing, requ...
Antonio Capone, Ilario Filippini, Luigi Fratta, Lu...
ICMI
2005
Springer
113views Biometrics» more  ICMI 2005»
15 years 5 months ago
Hapticat: exploration of affective touch
This paper describes the Hapticat , a device we developed to study affect through touch. Though intentionally not highly zoomorphic, the device borrows behaviors from pets and th...
Steve Yohanan, Mavis Chan, Jeremy Hopkins, Haibo S...
CF
2004
ACM
15 years 5 months ago
Predictable performance in SMT processors
Current instruction fetch policies in SMT processors are oriented towards optimization of overall throughput and/or fairness. However, they provide no control over how individual ...
Francisco J. Cazorla, Peter M. W. Knijnenburg, Riz...
SEMWEB
2004
Springer
15 years 5 months ago
Applying KAoS Services to Ensure Policy Compliance for Semantic Web Services Workflow Composition and Enactment
In this paper we describe our experience in applying KAoS services to ensure policy compliance for Semantic Web Services workflow composition and enactment. We are developing thes...
Andrzej Uszok, Jeffrey M. Bradshaw, Renia Jeffers,...