Sciweavers

3819 search results - page 630 / 764
» The Emergence of Cellular Computing
Sort
View
COGSCI
2006
101views more  COGSCI 2006»
15 years 5 months ago
Aging and the Use of Context in Ambiguity Resolution: Complex Changes From Simple Slowing
Older and younger adults' abilities to use context information rapidly during ambiguity resolution were investigated. In Experiments 1 and 2, younger and older adults heard a...
Karen Stevens Dagerman, Maryellen C. MacDonald, Mi...
CORR
2006
Springer
104views Education» more  CORR 2006»
15 years 5 months ago
Unmanaged Internet Protocol: Taming the Edge Network Management Crisis
Though appropriate for core Internet infrastructure, the Internet Protocol is unsuited to routing within and between emerging ad-hoc edge networks due to its dependence on hierarc...
Bryan Ford
EOR
2006
66views more  EOR 2006»
15 years 5 months ago
Using intervals for global sensitivity and worst-case analyses in multiattribute value trees
Sensitivity analyses have long been used to assess the impacts of uncertainties on outcomes of decision models. Several approaches have been suggested, but it has been problematic...
Jyri Mustajoki, Raimo P. Hämäläinen...
FGCS
2006
76views more  FGCS 2006»
15 years 5 months ago
G-lambda: Coordination of a Grid scheduler and lambda path service over GMPLS
At iGrid2005, we conducted a live demonstration where our Grid scheduling system co-allocated computing and network resources with advance reservation through Web services interfa...
Atsuko Takefusa, Michiaki Hayashi, Naohide Nagatsu...
CN
2007
172views more  CN 2007»
15 years 5 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi