Sciweavers

1573 search results - page 235 / 315
» Strong User Authentication
Sort
View
DSRT
2008
IEEE
15 years 4 months ago
Simulating the Potential Savings of Implicit Energy Management on a City Scale
According to statistics and future prospects in the next few years world-wide energy consumption will increase significantly. Therefore not only more energy efficient technologi...
Doris Zachhuber, Jakob Doppler, Alois Ferscha, Cor...
INFOCOM
2008
IEEE
15 years 4 months ago
Multicast Tree Diameter for Dynamic Distributed Interactive Applications
Abstract—Latency reduction in distributed interactive applications has been studied intensively. Such applications may have stringent latency requirements and dynamic user groups...
Knut-Helge Vik, Pål Halvorsen, Carsten Griwo...
CIDM
2007
IEEE
15 years 4 months ago
Analysis of streaming GPS measurements of surface displacement through a web services environment
Abstract— We present a method for performing mode classification of real-time streams of GPS surface position data. Our approach has two parts: an algorithm for robust, unconstr...
Robert Granat, Galip Aydin, Marlon E. Pierce, Zhig...
ESA
2007
Springer
120views Algorithms» more  ESA 2007»
15 years 4 months ago
Evolutionary Equilibrium in Bayesian Routing Games: Specialization and Niche Formation
Abstract. In this paper we consider Nash Equilibria for the selfish routing model proposed in [12], where a set of n users with tasks of different size try to access m parallel l...
Petra Berenbrink, Oliver Schulte
IEEEARES
2006
IEEE
15 years 3 months ago
No Risk is Unsafe: Simulated Results on Dependability of Complementary Currencies
Efforts have been put for electronization of complementary currencies (alternative forms of monetary media) in the hope that it would reduce their operational cost. However, this ...
Kenji Saito, Eiichi Morino, Jun Murai