Academic literature on the topic 'Ad-hoc Collaboration'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Ad-hoc Collaboration.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Ad-hoc Collaboration"

1

Bendkowski, Jacek. "How to manage ad-hoc collaboration networks." Scientific Papers of Silesian University of Technology. Organization and Management Series 2017, no. 108 (2017): 23–34. http://dx.doi.org/10.29119/1641-3466.2017.108.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Broberg, Jacob Honoré, Søren Thorhauge Hede, Simon Bjerg Mikkelsen, Jesper Ellgaard Pedersen, Christian Bräuner Sørensen, Per Printz Madsen, and Ole Elenius Meilvang Borch. "Collaboration Layer for Robots in Mobile Ad-hoc Networks." IFAC Proceedings Volumes 42, no. 22 (2009): 103–10. http://dx.doi.org/10.3182/20091006-3-us-4006.00018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Crowcroft, Jon, Richard Gibbens, Frank Kelly, and Sven Östring. "Modelling incentives for collaboration in mobile ad hoc networks." Performance Evaluation 57, no. 4 (August 2004): 427–39. http://dx.doi.org/10.1016/j.peva.2004.03.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pan, Jianping, Lin Cai, Xuemin (Sherman) Shen, and Jon W. Mark. "Identity-based secure collaboration in wireless ad hoc networks." Computer Networks 51, no. 3 (February 2007): 853–65. http://dx.doi.org/10.1016/j.comnet.2006.05.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ahn, Gail-Joon, Jing Jin, and Mohamed Shehab. "Policy-driven role-based access management for ad-hoc collaboration." Journal of Computer Security 20, no. 2-3 (June 12, 2012): 223–57. http://dx.doi.org/10.3233/jcs-2012-0446.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Perlman, Bruce J., and J. Edwin Benton. "Devolutionary Realignment: Shedding Services, Ad Hoc Collaboration, and Political Reconfiguration." State and Local Government Review 46, no. 3 (September 2014): 205–10. http://dx.doi.org/10.1177/0160323x14553474.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jacob, Jeevan, and Koshy Varghese. "A framework for ad hoc information management for the building design process." Engineering, Construction and Architectural Management 25, no. 8 (September 17, 2018): 1034–52. http://dx.doi.org/10.1108/ecam-06-2017-0097.

Full text
Abstract:
Purpose The building design processes today are complex, involving many disciplines and issues like collaboration, concurrency and collocation. Several studies have focused on understanding and modeling formal information exchange in these processes. Few past studies have also identified the importance of informal information exchanges in the design process and proposed passive solutions for facilitating this exchange. The purpose of this paper is to term the informal information as ad hoc information and explores if components of ad hoc information exchanges can be actively managed. Design/methodology/approach An MDM-based framework integrating product, process and people dependencies is proposed and a prototype platform to implement this framework is developed. The demonstration on the usage of this platform to identify information paths during collaboration and hence manage ad hoc information exchanges is presented through an example problem. Findings Based on the effectiveness of the prototype platform in identifying information paths for design queries, it is concluded that the proposed framework is useful for actively managing some components of ad hoc information exchange. Originality/value This research enables the design manager/participants to make a more informed decision on requesting and releasing design information.
APA, Harvard, Vancouver, ISO, and other styles
8

St Juste, Pierre, Kyuho Jeong, Heungsik Eom, Corey Baker, and Renato Figueiredo. "TinCan: User-Defined P2P Virtual Network Overlays for Ad-hoc Collaboration." EAI Endorsed Transactions on Collaborative Computing 1, no. 2 (October 15, 2014): e4. http://dx.doi.org/10.4108/cc.1.2.e4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Khawaja, Imran Abbas, Adnan Abid, Muhammad Shoaib Farooq, Adnan Shahzada, Uzma Farooq, and Kamran Abid. "Ad-Hoc Collaboration Space for Distributed Cross Device Mobile Application Development." IEEE Access 8 (2020): 62800–62814. http://dx.doi.org/10.1109/access.2020.2980319.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Raniwala, Ashish, Gefan Zhang, Ashwini Sridhar, Jian P. Zheng, and Tzi‐cker Chiueh. "WShare: an instant secure collaboration workspace over ad hoc wireless LAN." International Journal of Pervasive Computing and Communications 5, no. 4 (November 20, 2009): 428–47. http://dx.doi.org/10.1108/17427370911008839.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Ad-hoc Collaboration"

1

Jiang, Ning. "COLLABORATION ENFORCEMENT IN MOBILE AD HOC NETWORKS." Doctoral diss., University of Central Florida, 2006. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2718.

Full text
Abstract:
Mobile Ad hoc NETworks (MANETs) have attracted great research interest in recent years. Among many issues, lack of motivation for participating nodes to collaborate forms a major obstacle to the adoption of MANETs. Many contemporary collaboration enforcement techniques employ reputation mechanisms for nodes to avoid and penalize malicious participants. Reputation information is propagated among participants and updated based on complicated trust relationships to thwart false accusation of benign nodes. The aforementioned strategy suffers from low scalability and is likely to be exploited by adversaries. To address these problems, we first propose a finite state model. With this technique, no reputation information is propagated in the network and malicious nodes cannot cause false penalty to benign hosts. Misbehaving node detection is performed on-demand; and malicious node punishment and avoidance are accomplished by only maintaining reputation information within neighboring nodes. This scheme, however, requires that each node equip with a tamper-proof hardware. In the second technique, no such restriction applies. Participating nodes classify their one-hop neighbors through direct observation and misbehaving nodes are penalized within their localities. Data packets are dynamically rerouted to circumvent selfish nodes. In both schemes, overall network performance is greatly enhanced. Our approach significantly simplifies the collaboration enforcement process, incurs low overhead, and is robust against various malicious behaviors. Simulation results based on different system configurations indicate that the proposed technique can significantly improve network performance with very low communication cost.
Ph.D.
School of Computer Science
Engineering and Computer Science
Computer Science
APA, Harvard, Vancouver, ISO, and other styles
2

Chardin, Ivan Sergeyevich 1977. "Spatial aspects of mobile ad hoc collaboration." Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/61140.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, School of Architecture and Planning, Program in Media Arts and Sciences, 2003.
Includes bibliographical references (p. 72-76).
Traditionally, communication devices are designed to overcome distance in space or time. How can personal mobile tools augment local interaction and promote spontaneous collaboration between users in proximity? Mobile ad hoc collaboration is an emerging framework that attempts to answer this question. This thesis reviews current research in mobile ad hoc collaboration, explores its precedents in art, and examines the enabling wireless communication and location sensing technology. It then proceeds to consider location, proximity and spatial organization as major factors in the development of interfaces and applications within the framework. The importance of seamless transitions between face-to-face communication and mediated communication is emphasized, and the principle of ad hoc communication group formation on the basis of proximity is proposed. The principle is demonstrated in a prototype wearable system for synchronous voice messaging.
by Ivan Sergeyevich Chardin.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
3

Citro, Sandy, and c1tro@yahoo com au. "A Framework for Real Time Collaborative Editing in a Mobile Replicated Architecture." RMIT University. Computer Science and Information Technology, 2008. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20080424.113836.

Full text
Abstract:
Mobile collaborative work is a developing sub-area of Computer Supported Collaborative Work (CSCW). The future of this field will be marked by a significant increase in mobile device usage as a tool for co-workers to cooperate, collaborate and work on a shared workspace in real-time to produce artefacts such as diagrams, text and graphics regardless of their geographical locations. A real-time collaboration editor can utilise a centralised or a replicated architecture. In a centralised architecture, a central server holds the shared document as well as manages the various aspects of the collaboration, such as the document consistency, ordering of updates, resolving conflicts and the session membership. Every user's action needs to be propagated to the central server, and the server will apply it to the document to ensure it results in the intended document state. Alternatively, a decentralised or replicated architecture can be used where there is no central server to store the shared document. Every participating site contains a copy of the shared document (replica) to work on separately. Using this architecture, every user's action needs to be broadcast to all participating sites so each site can update their replicas accordingly. The replicated architecture is attractive for such applications, especially in wireless and ad-hoc networks, since it does not rely on a central server and a user can continue to work on his or her own local document replica even during disconnection period. However, in the absence of a dedicated server, the collaboration is managed by individual devices. This presents challenges to implement collaborative editors in a replicated architecture, especially in a mobile network which is characterised by limited resource reliability and availability. This thesis addresses challenges and requirements to implement group editors in wireless ad-hoc network environments where resources are scarce and the network is significantly less stable and less robust than wired fixed networks. The major contribution of this thesis is a proposed framework that comprises the proposed algorithms and techniques to allow each device to manage the important aspects of collaboration such as document consistency, conflict handling and resolution, session membership and document partitioning. Firstly, the proposed document consistency algorithm ensures the document replicas held by each device are kept consistent despite the concurrent updates by the collaboration participants while taking into account the limited resource of mobile devices and mobile networks. Secondly, the proposed conflict management technique provides users with conflict status and information so that users can handle and resolve conflicts appropriately. Thirdly, the proposed membership management algorithm ensures all participants receive all necessary updates and allows users to join a currently active collaboration session. Fourthly, the proposed document partitioning algorithm provides flexibility for users to work on selected parts of the document and reduces the resource consumption. Finally, a basic implementation of the framework is presented to show how it can support a real time collaboration scenario.
APA, Harvard, Vancouver, ISO, and other styles
4

Perez, Priego Juan Gabriel. "Ad-Hoc Sharing for Palm Devices." ScholarWorks@UNO, 2005. http://scholarworks.uno.edu/td/239.

Full text
Abstract:
The current generation of Palm PDA devices is designed to share information records primarily with a base desktop system, or a server. Therefore, their built- in features for sharing data during ad-hoc collaboration among groups of mobile users are inadequate. In this thesis, we describe a new framework that addresses this problem by allowing users to transparently share the record databases of common applications during spontaneous collaborative sessions. The framework also allows users to define custom sharing policies for each application/user pair. These policies determine the manner in which records are exchanged and update, thereby automating the process of handling conflicts and preserving user privacy preferences. We also present implementation results, in which we have used the framework to create shared versions of common applications, such as Calendar and Memo. Our experimental results show that the programming effort involved is minimal and the user interaction with the application is, essentially, the same as in the original application.
APA, Harvard, Vancouver, ISO, and other styles
5

Manescu, Corneliu. "Video and voice coding for mobile ad-hoc collaboration." [Gainesville, Fla.] : University of Florida, 2003. http://purl.fcla.edu/fcla/etd/UFE0000740.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lee, Wei-Hsing. "Decentralized ad-hoc groupware API and framework for mobile collaboration." [Florida] : State University System of Florida, 2000. http://etd.fcla.edu/etd/uf/2000/ane5959/master.pdf.

Full text
Abstract:
Thesis (M.S.)--University of Florida, 2000.
Title from first page of PDF file. Document formatted into pages; contains ix, 83 p.; also contains graphics. Vita. Includes bibliographical references (p. 81-82).
APA, Harvard, Vancouver, ISO, and other styles
7

Heinemann, Andreas. "Collaboration in Opportunistic Networks." Phd thesis, Saarbrücken VDM Verlag Dr. Müller, 2007. http://tuprints.ulb.tu-darmstadt.de/834/1/heinemann07-diss.pdf.

Full text
Abstract:
Motivation. With the increasing integration of wireless short-range communication technologies (Bluetooth, 802.11b WiFi) into mobile devices, novel applications for spontaneous communication, interaction and collaboration are possible. We distinguish between active and passive collaboration. The devices help users become aware of each other and stimulate face-to-face conversation (active collaboration). Also, autonomous device communication for sharing information without user interaction is possible, i.e., devices pass information to other devices in their vicinity (passive collaboration). Both, active and passive collaboration requires a user to specify what kind of information he offers and what kind of information he is interested in. Object of Research: Opportunistic Networks. Spontaneous communication of mobile devices leads to so-called opportunistic networks, a new and promising evolution in mobile ad-hoc networking. They are formed by mobile devices which communicate with each other while users are in close proximity. There are two prominent characteristics present in opportunistic networks: 1) A user provides his personal device as a network node. 2) Users are a priori unknown to each other. Objectives. Due to the fact that a user dedicates his personal device as a node to the opportunistic network and interacts with other users unknown to him, collaboration raises questions concerning two important human aspects: user privacy and incentives. The users’ privacy is at risk, since passive collaboration applications may expose personal information about a user. Furthermore, some form of incentive is needed to encourage a user to share his personal device resources with others. Both issues, user privacy and incentives, need to be taken into account in order to increase the user acceptability of opportunistic network applications. These aspects have not been addressed together with the technical tasks in prior opportunistic network research. Scientific Contribution and Evaluation. This thesis investigates opportunistic networks in their entirety, i.e., our technical design decisions are appropriate for user privacy preservation and incentive schemes. In summary, the proposed concepts comprise system components, a node architecture, a system model and a simple one-hop communication paradigm for opportunistic network applications. One focus of this work is a profile-based data dissemination mechanism. A formal model for this mechanism will be presented. On top of that, we show how to preserve the privacy of a user by avoiding static and thus linkable data and an incentive scheme that is suitable for opportunistic network applications. The evaluation of this work is twofold. We implemented two prototypes on off-the-shelf hardware to show the technical feasibility of our opportunistic network concepts. Also, the prototypes were used to carry out a number of runtime measurements. Then, we developed a novel two-step simulation method for opportunistic data dissemination. The simulation combines real world user traces with artificial user mobility models, in order to model user movements more realistically. We investigate our opportunistic data dissemination process under various settings, including different communication ranges and user behavior patterns. Our results depict, within the limits of our model and assumptions, a good performance of the data dissemination process.
APA, Harvard, Vancouver, ISO, and other styles
8

Kedji, Komlan Akpédjé. "Modélisation et mise en œuvre de processus collaboratifs ad hoc." Phd thesis, Université Toulouse le Mirail - Toulouse II, 2013. http://tel.archives-ouvertes.fr/tel-00912975.

Full text
Abstract:
Le développement logiciel est une activité intensément collaborative. Les problématiques habituelles de collaboration (organisation des tâches, utilisation des ressources, communication, etc.) y sont exacerbées par le rythme rapide des changements, la complexité et la grande interdépendance des artéfacts, le volume toujours croissant d'informations de contexte à traiter, la distribution géographique des participants, etc. Par conséquent, la question du support outillé de la collaboration se pose plus fortement que jamais en ingénierie logicielle. Dans cette thèse, nous abordons la question de la collaboration sous l'angle de la modélisation et de l'exploitation des processus de développement. Ces derniers sont traditionnellement considérés comme une structure imposée sur le développement d'un produit logiciel. Cependant, une part importante de la collaboration en génie logiciel est de nature ad hoc, faite d'activités non planifiées. Afin de faire contribuer les processus logiciels au support de la collaboration, en particulier celle non planifiée, nous nous intéressons à leur fonction de banques d'information sur les éléments clés de cette collaboration et les interactions entre ces derniers. Notre contribution est, d'une part, un modèle conceptuel du support au développement collaboratif, capable de rendre compte de la structure d'outils classiques comme ceux de gestion de versions ou de gestion de défauts logiciels. Ce modèle conceptuel est ensuite appliqué aux modèles de processus logiciels. Nous définissons ainsi une approche globale d'exploitation des informations de processus pour le support de la collaboration, basée sur les notions centrales de langage de requête d'information et de mécanisme de réaction aux événements. D'autre part, nous proposons un métamodèle, CMSPEM (Collaborative Model-Based Software & System Process Engineering Metamodel), qui enrichit le standard SPEM (Software & System Process Engineering Metamodel) avec des concepts et relations nécessaires au support de la collaboration. Ce métamodèle est outillé avec des outils de création de modèle (éditeurs graphiques et textuels), et un serveur de processus offrant un langage de requêtes basé sur HTTP/REST et un framework de souscription et de réaction aux événements de processus. Enfin, notre approche conceptuelle a été illustrée et validée, en premier lieu, par une analyse des pratiques inférées à partir des données de développement de 219 projets open source. En second lieu, des utilitaires de support à la collaboration (mise à disposition d'informations conceptuelles, automatisation d'actions, extraction d'information sur les contributions individuelles) ont été implémentés à travers le serveur de processus CMSPEM.
APA, Harvard, Vancouver, ISO, and other styles
9

Braconnot, Velloso Pedro. "Un modèle de confiance pour les réseaux ad hoc." Paris 6, 2008. http://www.theses.fr/2008PA066121.

Full text
Abstract:
Cette thèse aborde le problème de l’evaluation et de la gestion de la confiance dans les réseaux ad hoc, où les noeuds accumulent le rôle de routeur, de serveur et de client, les obligeant coopérer pour un bon fonctionnement du réseau. Plusieurs protocoles et applications ont été proposés puisque les solutions conventionnelles ne sont pas adaptées aux réseaux ad hoc. Cependant, la plupart des ces travaux considèrent l’existence d’une parfaite coopération entre les noeuds supposant qu’ils se comportent tous selon les spécifications des applications et des protocoles précédemment déterminés pour le réseau. Néanmoins, cette condition peut être fausse, à cause de restrictions de ressource ou comportement malveillant. Par suite, les noeuds peuvent ne pas se comporter comme prévu et entraîner un mauvais fonctionnement du réseau. Par conséquent, un mécanisme permettant à un noeud d’avoir confiance en d’autres noeuds est nécessaire. Nous proposons un modèle de confiance où les noeuds d’un réseau ad hoc établissent un rapport de confiance basé sur des expériences et des recommandations préalables. Nous présentons également le Recommendation Exchange Protocol qui permet aux noeuds d’échanger des recommandations avec ses voisins. Le but est de rendre les noeuds d’un réseau capables de recueillir des informations pour raisonner, apprendre et prendre leur propre décision. Nous nous concentrons sur fournir aux noeuds le niveau de confiance de chaque voisin direct, c’est-à-dire, un voisin a portée radio. Différemment de la majorité des travaux sur le sujet, notre modèle s’applique bien à d’autres échelles, en limitant les interactions aux voisins directs, ce qui diminue le nombre de messages et, par conséquent, la consommation d’énergie. En outre, elle aide à atténuer les l’effet des fausses recommandations. Nous présentons le concept de maturité de rapport qui permet aux noeuds d’améliorer l’efficacité du modèle dans les réseaux mobiles. Nous montrons l’exactitude de notre modèle dans un réseau ad hoc de communication directe par des simulations en utilisant un simulateur développé pour notre modèle. L’analyse a, alors, été étendue aux réseaux mobiles ad hoc multisaut, montrant les avantages d’employer le concept de rapport de maturité. Finalement, nous évaluons l’impact des noeuds malveillants qui envoient de fausses recommandations afin de dégrader l’efficacité du modèle de confiance. Les résultats montrent que notre modèle tolère jusqu’à 40% de noeuds malveillants.
APA, Harvard, Vancouver, ISO, and other styles
10

Kwong, Mylène D. "Transmission efficace en temps réel de la voix sur réseaux ad hoc sans fil." Thèse, Université de Sherbrooke, 2008. http://savoirs.usherbrooke.ca/handle/11143/1827.

Full text
Abstract:
La téléphonie mobile se démocratise et de nouveaux types de réseaux voient le jour, notamment les réseaux ad hoc. Sans focaliser exclusivement sur ces réseaux particuliers, le nombre de communications vocales effectuées chaque minute est en constante augmentation mais les réseaux sont encore souvent victimes d'erreurs de transmission. L'objectif de cette thèse porte sur l'utilisation de méthodes de codage en vue d'une transmission de la voix robuste face aux pertes de paquets, sur un réseau mobile et sans fil perturbé permettant le multichemin. La méthode envisagée prévoit l'utilisation d'un codage en descriptions multiples (MDC) appliqué à un flux de données issu d'un codec de parole bas débit, plus particulièrement l'AMR-WB (Adaptive Multi Rate - Wide Band). Parmi les paramètres encodés par l'AMR-WB, les coefficients de la prédiction linéaire sont calculés une fois par trame, contrairement aux autres paramètres qui sont calculés quatre fois. La problématique majeure réside dans la création adéquate de descriptions pour les paramètres de prédiction linéaire. La méthode retenue applique une quantification vectorielle conjuguée à quatre descriptions. Pour diminuer la complexité durant la recherche, le processus est épaulé d'un préclassificateur qui effectue une recherche localisée dans le dictionnaire complet selon la position d'un vecteur d'entrée. L'application du modèle de MDC à des signaux de parole montre que l'utilisation de quatre descriptions permet de meilleurs résultats lorsque le réseau est sujet à des pertes de paquets. Une optimisation de la communication entre le routage et le processus de création de descriptions mène à l'utilisation d'une méthode adaptative du codage en descriptions. Les travaux de cette thèse visaient la retranscription d'un signal de parole de qualité, avec une optimisation adéquate des ressources de stockage, de la complexité et des calculs. La méthode adaptative de MDC rencontre ces attentes et s'avère très robuste dans un contexte de perte de paquets.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Ad-hoc Collaboration"

1

A review of disaster medical preparedness: Improving coordination and collaboration in the delivery of medical assistance during disasters : hearing before the Ad Hoc Subcommittee on State, Local, and Private Sector Preparedness and Integration of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Eleventh Congress, second session, July 22, 2010. Washington: U.S. G.P.O., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Border corruption: Assessing Customs and Border Protection and the Department of Homeland Security Inspector General's Office collaboration in the fight to prevent corruption : hearing before the Ad Hoc Subcommittee on Disaster Recovery and Intergovernmental Affairs of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Twelfth Congress, first session, June 9, 2011. Washington: U.S. G.P.O., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Collaborative Services in an Ad Hoc Wireless Network. Storming Media, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Ad-hoc Collaboration"

1

Reuter, Christian. "Scenario B: Ad Hoc Participation in Mobile Collaboration (TOCHI)." In Emergent Collaboration Infrastructures, 109–33. Wiesbaden: Springer Fachmedien Wiesbaden, 2015. http://dx.doi.org/10.1007/978-3-658-08586-5_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cai, Lin, Jianping Pan, Xuemin Shen, and Jon W. Mark. "Peer Collaboration in Wireless Ad Hoc Networks." In NETWORKING 2005. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems, 840–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11422778_68.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kedji, Komlan Akpédjé, Bernard Coulette, Redouane Lbath, and Mahmoud Nassar. "Modeling Ad-Hoc Collaboration for Automated Process Support." In Lecture Notes in Business Information Processing, 205–16. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27213-4_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nittel, Silvia, Christopher Dorr, and John C. Whittier. "LocalAlert: Simulating Decentralized Ad-Hoc Collaboration in Emergency Situations." In Geographic Information Science, 146–59. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33024-7_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lorch, Markus, and Dennis Kafura. "Supporting Secure Ad-hoc User Collaboration in Grid Environments." In Grid Computing — GRID 2002, 181–93. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-36133-2_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lorre, Jean-Pierre, Yiannis Verginadis, Nikos Papageorgiou, and Nicolas Salatge. "Ad-hoc Execution of Collaboration Patterns using Dynamic Orchestration." In Enterprise Interoperability IV, 3–12. London: Springer London, 2010. http://dx.doi.org/10.1007/978-1-84996-257-5_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ghazzai, Hakim, Elias Yaacoub, Abdullah Kadri, and Mohamed-Slim Alouini. "Multi-operator Collaboration for Green Cellular Networks." In Energy Management in Wireless Cellular and Ad-hoc Networks, 97–122. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-27568-0_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ens, Barrett, Eyal Ofek, Neil Bruce, and Pourang Irani. "Shared Façades: Surface-Embedded Layout Management for Ad Hoc Collaboration Using Head-Worn Displays." In Collaboration Meets Interactive Spaces, 153–76. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-45853-3_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Maurya, Ghyani Umesh Kumar, and Sushil Kumar. "Cooperation Enforcement and Collaboration Inducement in Mobile Ad Hoc Networks." In Intelligent Computing, Networking, and Informatics, 221–31. New Delhi: Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1665-0_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Guan, Zhenyu, Jiawei Li, Hao Liu, and Dawei Li. "A Wearable Ad Hoc Device for Situational Awareness and Trusted Collaboration." In Smart Blockchain, 11–20. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34083-4_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Ad-hoc Collaboration"

1

Kortuem, Gerd, Hans-Werner Gellersen, and Mark Billinghurst. "Mobile ad hoc collaboration." In CHI '02 extended abstracts. New York, New York, USA: ACM Press, 2002. http://dx.doi.org/10.1145/506443.506665.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Maamar, Z., Q. H. Mahmoud, and A. Derhab. "On Promoting Ad-Hoc Collaboration Among Messengers." In 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06). IEEE, 2006. http://dx.doi.org/10.1109/aina.2006.247.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hegde, Rajesh, and Prasun Dewan. "Connecting Programming Environments to Support Ad-Hoc Collaboration." In 2008 23rd IEEE/ACM International Conference on Automated Software Engineering. IEEE, 2008. http://dx.doi.org/10.1109/ase.2008.28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nakae, Masayuki, Xinwen Zhang, and Ravi Sandhu. "A general design towards secure ad-hoc collaboration." In the 2006 ACM Symposium. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1128817.1128874.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Deng, Lingli, Yeping He, and Ziyao Xu. "Enforcing Separation of Duty in Ad Hoc Collaboration." In 2008 9th International Conference for Young Computer Scientists (ICYCS). IEEE, 2008. http://dx.doi.org/10.1109/icycs.2008.131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Maamar, Z., Q. H. Mahmoud, A. Derhab, and W. Mansoor. "Ad-Hoc Collaboration Between Messengers: Operations and Incentives." In 7th International Conference on Mobile Data Management (MDM'06). IEEE, 2006. http://dx.doi.org/10.1109/mdm.2006.29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Alcántara, Jesús Muñoz, Panos Markopoulos, and Mathias Funk. "Social Media as ad hoc Design Collaboration Tools." In ECCE '15: European Conference on Cognitive Ergonomics 2015. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2788412.2788420.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Malik, Ashfaq Ahmed, Muhammad Adil Khan, Athar Mahboob, and Faraz Haider. "Secure geo-sharing in mobile ad-hoc networks." In 2012 International Conference on Collaboration Technologies and Systems (CTS). IEEE, 2012. http://dx.doi.org/10.1109/cts.2012.6261041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Alqallaf, Maha, and Bin Wang. "Software defined collaborative secure ad hoc wireless networks." In 2015 International Conference on Collaboration Technologies and Systems (CTS). IEEE, 2015. http://dx.doi.org/10.1109/cts.2015.7210421.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cheng, Qi, and Eric Chan Tin. "Efficient Routing and Scheduling in Ad-Hoc Cognitive Radio Networks." In 2014 National Wireless Research Collaboration Symposium (NWRCS). IEEE, 2014. http://dx.doi.org/10.1109/nwrcs.2014.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Ad-hoc Collaboration"

1

Ahn, Gail-Joon. Assured Resource Sharing in Ad-Hoc Collaboration. Office of Scientific and Technical Information (OSTI), December 2015. http://dx.doi.org/10.2172/1240145.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Seybold, Patricia. Needed: Ad Hoc Collaborative Services. Boston, MA: Patricia Seybold Group, January 2003. http://dx.doi.org/10.1571/psgp1-30-03cc.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography