Sciweavers

981 search results - page 139 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
STORAGESS
2005
ACM
15 years 7 months ago
Expecting the unexpected: adaptation for predictive energy conservation
The use of access predictors to improve storage device performance has been investigated for both improving access times, as well as a means of reducing energy consumed by the dis...
Jeffrey P. Rybczynski, Darrell D. E. Long, Ahmed A...
ATAL
2005
Springer
15 years 7 months ago
Fuzzy number approach to trust in coalition environment
General trust management model that we present is adapted for ad-hoc coalition environment, rather than for classic client-supplier relationship. The trust representation used in ...
Martin Rehák, Michal Pechoucek, Petr Benda
SIGMETRICS
2008
ACM
161views Hardware» more  SIGMETRICS 2008»
15 years 1 months ago
Noncooperative power control and transmission scheduling in wireless collision channels
We consider a wireless collision channel, shared by a finite number of mobile users who transmit to a common base station using a random access protocol. Mobiles are selfoptimizin...
Ishai Menache, Nahum Shimkin
CHI
2003
ACM
16 years 1 months ago
The mad hatter's cocktail party: a social mobile audio space supporting multiple simultaneous conversations
This paper presents a mobile audio space intended for use by gelled social groups. In face-to-face interactions in such social groups, conversational floors change frequently, e.g...
Paul M. Aoki, Matthew Romaine, Margaret H. Szymans...
ATAL
2008
Springer
15 years 3 months ago
Replacing the stop sign: unmanaged intersection control for autonomous vehicles
As computers inevitably begin to replace humans as the drivers of automobiles, our current human-centric traffic management mechanisms will give way to hyper-efficient systems and...
Mark Van Middlesworth, Kurt M. Dresner, Peter Ston...