Sciweavers

8658 search results - page 1499 / 1732
» Models of Command and Control
Sort
View
RTSS
2006
IEEE
15 years 10 months ago
An Optimal Real-Time Scheduling Algorithm for Multiprocessors
We present an optimal real-time scheduling algorithm for multiprocessors — one that satisfies all task deadlines, when the total utilization demand does not exceed the utilizat...
Hyeonjoong Cho, Binoy Ravindran, E. Douglas Jensen
SAINT
2006
IEEE
15 years 10 months ago
Fair Overload Handling Using Proof-of-Work Functions
Overload can reduce the overall performance of a computer system up to a point where the whole service might collapse. Thus, for example the load on a server must be controlled to...
Sebastian Golze, Gero Mühl
SP
2006
IEEE
110views Security Privacy» more  SP 2006»
15 years 10 months ago
Privacy and Contextual Integrity: Framework and Applications
Contextual integrity is a conceptual framework for understanding privacy expectations and their implications developed in the literature on law, public policy, and political philo...
Adam Barth, Anupam Datta, John C. Mitchell, Helen ...
ADHOCNOW
2006
Springer
15 years 10 months ago
ROAR: A Multi-rate Opportunistic AODV Routing Protocol for Wireless Ad-Hoc Networks
In this paper, we outline a simple approach, called ROAR, that enables the Ad-Hoc On-Demand Distance Vector (AODV) routing protocol to strengthen its routes by recruiting neighbors...
Kwan Wu Chin, Darryn Lowe
ACMACE
2006
ACM
15 years 10 months ago
From driving to expressive music performance: ensuring tempo smoothness
This paper focuses on the mapping strategies in the interface design for the Expression Synthesis Project (ESP). The goal of ESP is to use the metaphor of driving to allow non-exp...
Jie Liu, Elaine Chew, Alexandre R. J. Franç...
« Prev « First page 1499 / 1732 Last » Next »