Sciweavers

744 search results - page 93 / 149
» The Traust Authorization Service
Sort
View
PE
2010
Springer
212views Optimization» more  PE 2010»
14 years 4 months ago
Modeling TCP throughput: An elaborated large-deviations-based model and its empirical validation
In today's Internet, a large part of the traffic is carried using the TCP transport protocol. Characterization of the variations of TCP traffic is thus a major challenge, bot...
Patrick Loiseau, Paulo Gonçalves, Julien Ba...
CHI
2011
ACM
14 years 1 months ago
Improving the safety of homeless young people with mobile phones: values, form and function
By their pervasiveness and by being worn on our bodies, mobile phones seem to have become intrinsic to safety. To examine this proposition, 43 participants, from four stakeholder ...
Jill Palzkill Woelfer, Amy Iverson, David G. Hendr...
CHI
2011
ACM
14 years 1 months ago
Twitinfo: aggregating and visualizing microblogs for event exploration
Microblogs are a tremendous repository of user-generated content about world events. However, for people trying to understand events by querying services like Twitter, a chronolog...
Adam Marcus 0002, Michael S. Bernstein, Osama Bada...

Publication
341views
16 years 9 months ago
Incentive Compatible Mechanisms for Decentralized Supply Chain Formation
In this thesis, we describe a decentralized supply chain formation problem where the supply chain planner or a central design authority (CDA) is faced with the decision of choosi...
Nikesh Kumar Srivastava
CHI
2009
ACM
15 years 10 months ago
Magic cards: a paper tag interface for implicit robot control
Typical Human Robot Interaction (HRI) assumes that the user explicitly interacts with robots. However, explicit control with robots can be unnecessary or even undesirable in certa...
Shengdong Zhao, Koichi Nakamura, Kentaro Ishii, Ta...