Sciweavers

1460 search results - page 107 / 292
» Meeting people where they are
Sort
View
CPAIOR
2009
Springer
15 years 6 months ago
Sequencing and Counting with the multicost-regular Constraint
This paper introduces a global constraint encapsulating a regular constraint together with several cumulative costs. It is motivated in the context of personnel scheduling problems...
Julien Menana, Sophie Demassey
PIMRC
2008
IEEE
15 years 6 months ago
Cooperative handoff in wireless networks
—In 802.11-based wireless networks the stations (STAs) are associated with the available access points (APs) and communicate through them. In traditional handoff schemes the STAs...
George Athanasiou, Thanasis Korakis, Leandros Tass...
ICC
2007
IEEE
142views Communications» more  ICC 2007»
15 years 6 months ago
Distributed Privacy-Preserving Policy Reconciliation
— Organizations use security policies to regulate how they share and exchange information, e.g., under what conditions data can be exchanged, what protocols are to be used, who i...
Ulrike Meyer, Susanne Wetzel, Sotiris Ioannidis
KBSE
2007
IEEE
15 years 6 months ago
Diconic addition of failsafe fault-tolerance
We present a divide-and-conquer method, called DiConic, for automatic addition of failsafe fault-tolerance to distributed programs, where a failsafe program guarantees to meet its...
Ali Ebnenasir
SEUS
2007
IEEE
15 years 6 months ago
Soft Real-Time Task Response Time Prediction in Dynamic Embedded Systems
The hardware infrastructure that provides the support of ubiquitous embedded computing may be shared by different applications. Many of those applications have real-time requireme...
Cássia Yuri Tatibana, Carlos Montez, R&ocir...