Sciweavers

18769 search results - page 3746 / 3754
» Requirements Models in Context
Sort
View
INFOCOM
2011
IEEE
14 years 3 months ago
To preempt or not: Tackling bid and time-based cheating in online spectrum auctions
—Online spectrum auctions offer ample flexibility for bidders to request and obtain spectrum on-the-fly. Such flexibility, however, opens up new vulnerabilities to bidder mani...
Lara B. Deek, Xia Zhou, Kevin C. Almeroth, Haitao ...
VR
2011
IEEE
171views Virtual Reality» more  VR 2011»
14 years 3 months ago
Leveraging change blindness for redirection in virtual environments
We present change blindness redirection, a novel technique for allowing the user to walk through an immersive virtual environment that is considerably larger than the available ph...
Evan A. Suma, Seth Clark, David M. Krum, Samantha ...
ADHOC
2011
14 years 3 months ago
RadiaLE: A framework for designing and assessing link quality estimators in wireless sensor networks
—Stringent cost and energy constraints impose the use of low-cost and low-power radio transceivers in large-scale wireless sensor networks (WSNs). This fact, together with the ha...
Nouha Baccour, Anis Koubaa, Maissa Ben Jamâa...
ALGORITHMICA
2011
14 years 3 months ago
Algorithms for Marketing-Mix Optimization
Algorithms for determining quality/cost/price tradeoffs in saturated markets are consid-3 ered. A product is modeled by d real-valued qualities whose sum determines the unit cost ...
Joachim Gudmundsson, Pat Morin, Michiel H. M. Smid
ASPLOS
2011
ACM
14 years 3 months ago
NV-Heaps: making persistent objects fast and safe with next-generation, non-volatile memories
nt, user-defined objects present an attractive abstraction for working with non-volatile program state. However, the slow speed of persistent storage (i.e., disk) has restricted ...
Joel Coburn, Adrian M. Caulfield, Ameen Akel, Laur...
« Prev « First page 3746 / 3754 Last » Next »