Sciweavers

730 search results - page 117 / 146
» Reflections on network architecture: an active networking pe...
Sort
View
ICC
2007
IEEE
186views Communications» more  ICC 2007»
15 years 3 months ago
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks
– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...
ICCAD
2006
IEEE
152views Hardware» more  ICCAD 2006»
15 years 6 months ago
System-wide energy minimization for real-time tasks: lower bound and approximation
We present a dynamic voltage scaling (DVS) technique that minimizes system-wide energy consumption for both periodic and sporadic tasks. It is known that a system consists of proc...
Xiliang Zhong, Cheng-Zhong Xu
AI
2008
Springer
15 years 3 months ago
A Belief-Theoretic Reputation Estimation Model for Multi-context Communities
Online communities have grown to be an alternative form of communication for many people. This widespread growth and influence of the members of these communities in shaping the d...
Ebrahim Bagheri, M. Barouni-Ebrahimi, Reza Zafaran...
86
Voted
WMTE
2005
IEEE
15 years 3 months ago
Innovative Media in Support of Distributed Intelligence and Lifelong Learning
Individual, unaided human abilities are constrained. Media have helped us to transcend boundaries in thinking, working, learning, and collaborating by supporting distributed intel...
Gerhard Fischer, Shin'ichi Konomi
WMTE
2005
IEEE
15 years 3 months ago
Supporting Pervasive Learning Environments: Adaptability and Context Awareness in Mobile Learning
In the mobile learning context, it is helpful to consider context awareness and adaptivity as two sides of the same coin. The purpose of the adaptivity and context awareness is to...
Antti Syvänen, Russell Beale, Mike Sharples, ...