Sciweavers

229 search results - page 44 / 46
» Set Covering Problems in Role-Based Access Control
Sort
View
ACMDIS
2000
ACM
15 years 1 months ago
PaperButtons: Expanding a Tangible User Interface
: Expanding the functionality of a successful system is always a challenge; the initial simplicity and ease-of-use is easily lost in the process. Experience indicates that this pro...
Elin Rønby Pedersen, Tomas Sokoler, Les Nel...
ECRTS
2010
IEEE
14 years 10 months ago
Making DRAM Refresh Predictable
Embedded control systems with hard real-time constraints require that deadlines are met at all times or the system may malfunction with potentially catastrophic consequences. Sched...
Balasubramanya Bhat, Frank Mueller
ICUIMC
2009
ACM
15 years 4 months ago
Proposal and evaluation of multiple gateways distribution method for wireless mesh network
Researches on the wireless mesh network in which access points (APs) of a wireless LAN are connected by an ad-hoc networks are recently drawing much attention. In the wireless mes...
Masashi Ito, Toshihiro Shikama, Akira Watanabe
COMSWARE
2007
IEEE
15 years 3 months ago
On Optimal Performance in Mobile Ad hoc Networks
In this paper we are concerned with finding the maximum throughput that a mobile ad hoc network can support. Even when nodes are stationary, the problem of determining the capaci...
Tapas K. Patra, Joy Kuri, Pavan Nuggehalli
75
Voted
WEBI
2005
Springer
15 years 3 months ago
Metadata Propagation in the Web Using Co-Citations
Given the large heterogeneity of the World Wide Web, using metadata on the search engines side seems to be a useful track for information retrieval. Though, because a manual quali...
Camille Prime-Claverie, Michel Beigbeder, Thierry ...