Sciweavers

2242 search results - page 396 / 449
» Using Simulation in Call Centers
Sort
View
ICC
2007
IEEE
139views Communications» more  ICC 2007»
15 years 4 months ago
Impatient Backoff Algorithm: Fairness in a Distributed Ad-Hoc MAC
— Many distributed multiple access (MAC) protocols use an exponential backoff mechanism. In that mechanism, a node picks a random backoff time uniformly in an interval that doubl...
Rajarshi Gupta, Jean C. Walrand
IPPS
2007
IEEE
15 years 4 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...
MOBIQUITOUS
2007
IEEE
15 years 4 months ago
TRULLO - local trust bootstrapping for ubiquitous devices
—Handheld devices have become sufficiently powerful that it is easy to create, disseminate, and access digital content (e.g., photos, videos) using them. The volume of such cont...
Daniele Quercia, Stephen Hailes, Licia Capra
CDVE
2007
Springer
124views Visualization» more  CDVE 2007»
15 years 4 months ago
"Integrare", a Collaborative Environment for Behavior-Oriented Design
In order to build complex, large-scale, dependable systems it is necessary to use a development environment with an integrated set of capabilities that supports editing and formal...
Lian Wen, Robert Colvin, Kai Lin, John Seagrott, N...
DNA
2007
Springer
176views Bioinformatics» more  DNA 2007»
15 years 4 months ago
Asynchronous Spiking Neural P Systems: Decidability and Undecidability
In search for “realistic” bio-inspired computing models, we consider asynchronous spiking neural P systems, in the hope to get a class of computing devices with decidable prope...
Matteo Cavaliere, Ömer Egecioglu, Oscar H. Ib...