Sciweavers

2978 search results - page 116 / 596
» Operations Research
Sort
View
142
Voted
EUSAI
2004
Springer
15 years 7 months ago
Distance-Based Access Modifiers Applied to Safety in Home Networks
Home networks and the interconnection of home appliances is a classical theme in ubiquitous computing research. Security is a recurring concern, but there is a lack of awareness of...
Kjeld Høyer Mortensen, Kari R. Schougaard, ...
PODC
1991
ACM
15 years 6 months ago
Randomized Wait-Free Concurrent Objects (Extended Abstract)
d abstract) Maurice Herlihy Digital Equipment Corporation Cambridge Research Laboratory One Kendall Square Cambridge MA, 02139 Digital Equipment Corporation Cambridge Research Lab ...
Maurice Herlihy
115
Voted
AROBOTS
1999
118views more  AROBOTS 1999»
15 years 3 months ago
GripSee: A Gesture-Controlled Robot for Object Perception and Manipulation
We have designed a research platform for a perceptually guided robot, which also serves as a demonstrator for a coming generation of service robots. In order to operate semi-autono...
Mark Becker, Efthimia Kefalea, Eric Maël, Chr...
CORR
2012
Springer
205views Education» more  CORR 2012»
13 years 11 months ago
Pricing Data: A Look at Past Proposals, Current Plans, and Future Trends
Traditionally, network operators have only used simple flat-rate unlimited data plans to vie for customers. But today, with the popularity of mobile devices and exponential growt...
Soumya Sen, Carlee Joe-Wong, Sangtae Ha, Mung Chia...
AAAI
2012
13 years 5 months ago
Security Games for Controlling Contagion
Many strategic actions carry a ‘contagious’ component beyond the immediate locale of the effort itself. Viral marketing and peacekeeping operations have both been observed to ...
Jason Tsai, Thanh H. Nguyen, Milind Tambe