Sciweavers

518 search results - page 81 / 104
» On Automating Networked Enterprise Management
Sort
View
GIS
2009
ACM
15 years 10 months ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku
TRIDENTCOM
2005
IEEE
15 years 3 months ago
A Global X-Bone for Network Experiments
A global Internet overlay testbed is being deployed to support the distributed, shared use of resources for network research. The Global X-Bone (GX-Bone) augments the X-Bone softw...
Joseph D. Touch, Yu-Shun Wang, Venkata K. Pingali,...
CTW
2008
92views more  CTW 2008»
14 years 8 months ago
WESTT (workload, error, situational awareness, time and teamwork): an analytical prototyping system for command and control
Modern developments in the use of information technology within command and control allow unprecedented degrees of flexibility in the way teams deal with tasks. These developments...
Robert J. Houghton, Chris Baber, Malcolm Cowton, G...
KR
2004
Springer
15 years 2 months ago
GAI Networks for Utility Elicitation
This paper deals with preference representation and elicitation in the context of multiattribute utility theory under risk. Assuming the decision maker behaves according to the EU...
Christophe Gonzales, Patrice Perny
REALWSN
2010
14 years 4 months ago
K2: A System for Campaign Deployments of Wireless Sensor Networks
Abstract. Environmental scientists frequently engage in "campaignstyle" deployments, where they visit a location for a relatively short period of time (several weeks to m...
Douglas Carlson, Jayant Gupchup, Rob Fatland, Andr...