Gotowa bibliografia na temat „Ad-hoc Collaboration”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Ad-hoc Collaboration”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Ad-hoc Collaboration"

1

Bendkowski, Jacek. "How to manage ad-hoc collaboration networks". Scientific Papers of Silesian University of Technology. Organization and Management Series 2017, nr 108 (2017): 23–34. http://dx.doi.org/10.29119/1641-3466.2017.108.2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Broberg, Jacob Honoré, Søren Thorhauge Hede, Simon Bjerg Mikkelsen, Jesper Ellgaard Pedersen, Christian Bräuner Sørensen, Per Printz Madsen i Ole Elenius Meilvang Borch. "Collaboration Layer for Robots in Mobile Ad-hoc Networks". IFAC Proceedings Volumes 42, nr 22 (2009): 103–10. http://dx.doi.org/10.3182/20091006-3-us-4006.00018.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Crowcroft, Jon, Richard Gibbens, Frank Kelly i Sven Östring. "Modelling incentives for collaboration in mobile ad hoc networks". Performance Evaluation 57, nr 4 (sierpień 2004): 427–39. http://dx.doi.org/10.1016/j.peva.2004.03.003.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Pan, Jianping, Lin Cai, Xuemin (Sherman) Shen i Jon W. Mark. "Identity-based secure collaboration in wireless ad hoc networks". Computer Networks 51, nr 3 (luty 2007): 853–65. http://dx.doi.org/10.1016/j.comnet.2006.05.012.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Ahn, Gail-Joon, Jing Jin i Mohamed Shehab. "Policy-driven role-based access management for ad-hoc collaboration". Journal of Computer Security 20, nr 2-3 (12.06.2012): 223–57. http://dx.doi.org/10.3233/jcs-2012-0446.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Perlman, Bruce J., i J. Edwin Benton. "Devolutionary Realignment: Shedding Services, Ad Hoc Collaboration, and Political Reconfiguration". State and Local Government Review 46, nr 3 (wrzesień 2014): 205–10. http://dx.doi.org/10.1177/0160323x14553474.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Jacob, Jeevan, i Koshy Varghese. "A framework for ad hoc information management for the building design process". Engineering, Construction and Architectural Management 25, nr 8 (17.09.2018): 1034–52. http://dx.doi.org/10.1108/ecam-06-2017-0097.

Pełny tekst źródła
Streszczenie:
Purpose The building design processes today are complex, involving many disciplines and issues like collaboration, concurrency and collocation. Several studies have focused on understanding and modeling formal information exchange in these processes. Few past studies have also identified the importance of informal information exchanges in the design process and proposed passive solutions for facilitating this exchange. The purpose of this paper is to term the informal information as ad hoc information and explores if components of ad hoc information exchanges can be actively managed. Design/methodology/approach An MDM-based framework integrating product, process and people dependencies is proposed and a prototype platform to implement this framework is developed. The demonstration on the usage of this platform to identify information paths during collaboration and hence manage ad hoc information exchanges is presented through an example problem. Findings Based on the effectiveness of the prototype platform in identifying information paths for design queries, it is concluded that the proposed framework is useful for actively managing some components of ad hoc information exchange. Originality/value This research enables the design manager/participants to make a more informed decision on requesting and releasing design information.
Style APA, Harvard, Vancouver, ISO itp.
8

St Juste, Pierre, Kyuho Jeong, Heungsik Eom, Corey Baker i Renato Figueiredo. "TinCan: User-Defined P2P Virtual Network Overlays for Ad-hoc Collaboration". EAI Endorsed Transactions on Collaborative Computing 1, nr 2 (15.10.2014): e4. http://dx.doi.org/10.4108/cc.1.2.e4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Khawaja, Imran Abbas, Adnan Abid, Muhammad Shoaib Farooq, Adnan Shahzada, Uzma Farooq i Kamran Abid. "Ad-Hoc Collaboration Space for Distributed Cross Device Mobile Application Development". IEEE Access 8 (2020): 62800–62814. http://dx.doi.org/10.1109/access.2020.2980319.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Raniwala, Ashish, Gefan Zhang, Ashwini Sridhar, Jian P. Zheng i Tzi‐cker Chiueh. "WShare: an instant secure collaboration workspace over ad hoc wireless LAN". International Journal of Pervasive Computing and Communications 5, nr 4 (20.11.2009): 428–47. http://dx.doi.org/10.1108/17427370911008839.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "Ad-hoc Collaboration"

1

Jiang, Ning. "COLLABORATION ENFORCEMENT IN MOBILE AD HOC NETWORKS". Doctoral diss., University of Central Florida, 2006. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2718.

Pełny tekst źródła
Streszczenie:
Mobile Ad hoc NETworks (MANETs) have attracted great research interest in recent years. Among many issues, lack of motivation for participating nodes to collaborate forms a major obstacle to the adoption of MANETs. Many contemporary collaboration enforcement techniques employ reputation mechanisms for nodes to avoid and penalize malicious participants. Reputation information is propagated among participants and updated based on complicated trust relationships to thwart false accusation of benign nodes. The aforementioned strategy suffers from low scalability and is likely to be exploited by adversaries. To address these problems, we first propose a finite state model. With this technique, no reputation information is propagated in the network and malicious nodes cannot cause false penalty to benign hosts. Misbehaving node detection is performed on-demand; and malicious node punishment and avoidance are accomplished by only maintaining reputation information within neighboring nodes. This scheme, however, requires that each node equip with a tamper-proof hardware. In the second technique, no such restriction applies. Participating nodes classify their one-hop neighbors through direct observation and misbehaving nodes are penalized within their localities. Data packets are dynamically rerouted to circumvent selfish nodes. In both schemes, overall network performance is greatly enhanced. Our approach significantly simplifies the collaboration enforcement process, incurs low overhead, and is robust against various malicious behaviors. Simulation results based on different system configurations indicate that the proposed technique can significantly improve network performance with very low communication cost.
Ph.D.
School of Computer Science
Engineering and Computer Science
Computer Science
Style APA, Harvard, Vancouver, ISO itp.
2

Chardin, Ivan Sergeyevich 1977. "Spatial aspects of mobile ad hoc collaboration". Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/61140.

Pełny tekst źródła
Streszczenie:
Thesis (S.M.)--Massachusetts Institute of Technology, School of Architecture and Planning, Program in Media Arts and Sciences, 2003.
Includes bibliographical references (p. 72-76).
Traditionally, communication devices are designed to overcome distance in space or time. How can personal mobile tools augment local interaction and promote spontaneous collaboration between users in proximity? Mobile ad hoc collaboration is an emerging framework that attempts to answer this question. This thesis reviews current research in mobile ad hoc collaboration, explores its precedents in art, and examines the enabling wireless communication and location sensing technology. It then proceeds to consider location, proximity and spatial organization as major factors in the development of interfaces and applications within the framework. The importance of seamless transitions between face-to-face communication and mediated communication is emphasized, and the principle of ad hoc communication group formation on the basis of proximity is proposed. The principle is demonstrated in a prototype wearable system for synchronous voice messaging.
by Ivan Sergeyevich Chardin.
S.M.
Style APA, Harvard, Vancouver, ISO itp.
3

Citro, Sandy, i c1tro@yahoo com au. "A Framework for Real Time Collaborative Editing in a Mobile Replicated Architecture". RMIT University. Computer Science and Information Technology, 2008. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20080424.113836.

Pełny tekst źródła
Streszczenie:
Mobile collaborative work is a developing sub-area of Computer Supported Collaborative Work (CSCW). The future of this field will be marked by a significant increase in mobile device usage as a tool for co-workers to cooperate, collaborate and work on a shared workspace in real-time to produce artefacts such as diagrams, text and graphics regardless of their geographical locations. A real-time collaboration editor can utilise a centralised or a replicated architecture. In a centralised architecture, a central server holds the shared document as well as manages the various aspects of the collaboration, such as the document consistency, ordering of updates, resolving conflicts and the session membership. Every user's action needs to be propagated to the central server, and the server will apply it to the document to ensure it results in the intended document state. Alternatively, a decentralised or replicated architecture can be used where there is no central server to store the shared document. Every participating site contains a copy of the shared document (replica) to work on separately. Using this architecture, every user's action needs to be broadcast to all participating sites so each site can update their replicas accordingly. The replicated architecture is attractive for such applications, especially in wireless and ad-hoc networks, since it does not rely on a central server and a user can continue to work on his or her own local document replica even during disconnection period. However, in the absence of a dedicated server, the collaboration is managed by individual devices. This presents challenges to implement collaborative editors in a replicated architecture, especially in a mobile network which is characterised by limited resource reliability and availability. This thesis addresses challenges and requirements to implement group editors in wireless ad-hoc network environments where resources are scarce and the network is significantly less stable and less robust than wired fixed networks. The major contribution of this thesis is a proposed framework that comprises the proposed algorithms and techniques to allow each device to manage the important aspects of collaboration such as document consistency, conflict handling and resolution, session membership and document partitioning. Firstly, the proposed document consistency algorithm ensures the document replicas held by each device are kept consistent despite the concurrent updates by the collaboration participants while taking into account the limited resource of mobile devices and mobile networks. Secondly, the proposed conflict management technique provides users with conflict status and information so that users can handle and resolve conflicts appropriately. Thirdly, the proposed membership management algorithm ensures all participants receive all necessary updates and allows users to join a currently active collaboration session. Fourthly, the proposed document partitioning algorithm provides flexibility for users to work on selected parts of the document and reduces the resource consumption. Finally, a basic implementation of the framework is presented to show how it can support a real time collaboration scenario.
Style APA, Harvard, Vancouver, ISO itp.
4

Perez, Priego Juan Gabriel. "Ad-Hoc Sharing for Palm Devices". ScholarWorks@UNO, 2005. http://scholarworks.uno.edu/td/239.

Pełny tekst źródła
Streszczenie:
The current generation of Palm PDA devices is designed to share information records primarily with a base desktop system, or a server. Therefore, their built- in features for sharing data during ad-hoc collaboration among groups of mobile users are inadequate. In this thesis, we describe a new framework that addresses this problem by allowing users to transparently share the record databases of common applications during spontaneous collaborative sessions. The framework also allows users to define custom sharing policies for each application/user pair. These policies determine the manner in which records are exchanged and update, thereby automating the process of handling conflicts and preserving user privacy preferences. We also present implementation results, in which we have used the framework to create shared versions of common applications, such as Calendar and Memo. Our experimental results show that the programming effort involved is minimal and the user interaction with the application is, essentially, the same as in the original application.
Style APA, Harvard, Vancouver, ISO itp.
5

Manescu, Corneliu. "Video and voice coding for mobile ad-hoc collaboration". [Gainesville, Fla.] : University of Florida, 2003. http://purl.fcla.edu/fcla/etd/UFE0000740.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Lee, Wei-Hsing. "Decentralized ad-hoc groupware API and framework for mobile collaboration". [Florida] : State University System of Florida, 2000. http://etd.fcla.edu/etd/uf/2000/ane5959/master.pdf.

Pełny tekst źródła
Streszczenie:
Thesis (M.S.)--University of Florida, 2000.
Title from first page of PDF file. Document formatted into pages; contains ix, 83 p.; also contains graphics. Vita. Includes bibliographical references (p. 81-82).
Style APA, Harvard, Vancouver, ISO itp.
7

Heinemann, Andreas. "Collaboration in Opportunistic Networks". Phd thesis, Saarbrücken VDM Verlag Dr. Müller, 2007. http://tuprints.ulb.tu-darmstadt.de/834/1/heinemann07-diss.pdf.

Pełny tekst źródła
Streszczenie:
Motivation. With the increasing integration of wireless short-range communication technologies (Bluetooth, 802.11b WiFi) into mobile devices, novel applications for spontaneous communication, interaction and collaboration are possible. We distinguish between active and passive collaboration. The devices help users become aware of each other and stimulate face-to-face conversation (active collaboration). Also, autonomous device communication for sharing information without user interaction is possible, i.e., devices pass information to other devices in their vicinity (passive collaboration). Both, active and passive collaboration requires a user to specify what kind of information he offers and what kind of information he is interested in. Object of Research: Opportunistic Networks. Spontaneous communication of mobile devices leads to so-called opportunistic networks, a new and promising evolution in mobile ad-hoc networking. They are formed by mobile devices which communicate with each other while users are in close proximity. There are two prominent characteristics present in opportunistic networks: 1) A user provides his personal device as a network node. 2) Users are a priori unknown to each other. Objectives. Due to the fact that a user dedicates his personal device as a node to the opportunistic network and interacts with other users unknown to him, collaboration raises questions concerning two important human aspects: user privacy and incentives. The users’ privacy is at risk, since passive collaboration applications may expose personal information about a user. Furthermore, some form of incentive is needed to encourage a user to share his personal device resources with others. Both issues, user privacy and incentives, need to be taken into account in order to increase the user acceptability of opportunistic network applications. These aspects have not been addressed together with the technical tasks in prior opportunistic network research. Scientific Contribution and Evaluation. This thesis investigates opportunistic networks in their entirety, i.e., our technical design decisions are appropriate for user privacy preservation and incentive schemes. In summary, the proposed concepts comprise system components, a node architecture, a system model and a simple one-hop communication paradigm for opportunistic network applications. One focus of this work is a profile-based data dissemination mechanism. A formal model for this mechanism will be presented. On top of that, we show how to preserve the privacy of a user by avoiding static and thus linkable data and an incentive scheme that is suitable for opportunistic network applications. The evaluation of this work is twofold. We implemented two prototypes on off-the-shelf hardware to show the technical feasibility of our opportunistic network concepts. Also, the prototypes were used to carry out a number of runtime measurements. Then, we developed a novel two-step simulation method for opportunistic data dissemination. The simulation combines real world user traces with artificial user mobility models, in order to model user movements more realistically. We investigate our opportunistic data dissemination process under various settings, including different communication ranges and user behavior patterns. Our results depict, within the limits of our model and assumptions, a good performance of the data dissemination process.
Style APA, Harvard, Vancouver, ISO itp.
8

Kedji, Komlan Akpédjé. "Modélisation et mise en œuvre de processus collaboratifs ad hoc". Phd thesis, Université Toulouse le Mirail - Toulouse II, 2013. http://tel.archives-ouvertes.fr/tel-00912975.

Pełny tekst źródła
Streszczenie:
Le développement logiciel est une activité intensément collaborative. Les problématiques habituelles de collaboration (organisation des tâches, utilisation des ressources, communication, etc.) y sont exacerbées par le rythme rapide des changements, la complexité et la grande interdépendance des artéfacts, le volume toujours croissant d'informations de contexte à traiter, la distribution géographique des participants, etc. Par conséquent, la question du support outillé de la collaboration se pose plus fortement que jamais en ingénierie logicielle. Dans cette thèse, nous abordons la question de la collaboration sous l'angle de la modélisation et de l'exploitation des processus de développement. Ces derniers sont traditionnellement considérés comme une structure imposée sur le développement d'un produit logiciel. Cependant, une part importante de la collaboration en génie logiciel est de nature ad hoc, faite d'activités non planifiées. Afin de faire contribuer les processus logiciels au support de la collaboration, en particulier celle non planifiée, nous nous intéressons à leur fonction de banques d'information sur les éléments clés de cette collaboration et les interactions entre ces derniers. Notre contribution est, d'une part, un modèle conceptuel du support au développement collaboratif, capable de rendre compte de la structure d'outils classiques comme ceux de gestion de versions ou de gestion de défauts logiciels. Ce modèle conceptuel est ensuite appliqué aux modèles de processus logiciels. Nous définissons ainsi une approche globale d'exploitation des informations de processus pour le support de la collaboration, basée sur les notions centrales de langage de requête d'information et de mécanisme de réaction aux événements. D'autre part, nous proposons un métamodèle, CMSPEM (Collaborative Model-Based Software & System Process Engineering Metamodel), qui enrichit le standard SPEM (Software & System Process Engineering Metamodel) avec des concepts et relations nécessaires au support de la collaboration. Ce métamodèle est outillé avec des outils de création de modèle (éditeurs graphiques et textuels), et un serveur de processus offrant un langage de requêtes basé sur HTTP/REST et un framework de souscription et de réaction aux événements de processus. Enfin, notre approche conceptuelle a été illustrée et validée, en premier lieu, par une analyse des pratiques inférées à partir des données de développement de 219 projets open source. En second lieu, des utilitaires de support à la collaboration (mise à disposition d'informations conceptuelles, automatisation d'actions, extraction d'information sur les contributions individuelles) ont été implémentés à travers le serveur de processus CMSPEM.
Style APA, Harvard, Vancouver, ISO itp.
9

Braconnot, Velloso Pedro. "Un modèle de confiance pour les réseaux ad hoc". Paris 6, 2008. http://www.theses.fr/2008PA066121.

Pełny tekst źródła
Streszczenie:
Cette thèse aborde le problème de l’evaluation et de la gestion de la confiance dans les réseaux ad hoc, où les noeuds accumulent le rôle de routeur, de serveur et de client, les obligeant coopérer pour un bon fonctionnement du réseau. Plusieurs protocoles et applications ont été proposés puisque les solutions conventionnelles ne sont pas adaptées aux réseaux ad hoc. Cependant, la plupart des ces travaux considèrent l’existence d’une parfaite coopération entre les noeuds supposant qu’ils se comportent tous selon les spécifications des applications et des protocoles précédemment déterminés pour le réseau. Néanmoins, cette condition peut être fausse, à cause de restrictions de ressource ou comportement malveillant. Par suite, les noeuds peuvent ne pas se comporter comme prévu et entraîner un mauvais fonctionnement du réseau. Par conséquent, un mécanisme permettant à un noeud d’avoir confiance en d’autres noeuds est nécessaire. Nous proposons un modèle de confiance où les noeuds d’un réseau ad hoc établissent un rapport de confiance basé sur des expériences et des recommandations préalables. Nous présentons également le Recommendation Exchange Protocol qui permet aux noeuds d’échanger des recommandations avec ses voisins. Le but est de rendre les noeuds d’un réseau capables de recueillir des informations pour raisonner, apprendre et prendre leur propre décision. Nous nous concentrons sur fournir aux noeuds le niveau de confiance de chaque voisin direct, c’est-à-dire, un voisin a portée radio. Différemment de la majorité des travaux sur le sujet, notre modèle s’applique bien à d’autres échelles, en limitant les interactions aux voisins directs, ce qui diminue le nombre de messages et, par conséquent, la consommation d’énergie. En outre, elle aide à atténuer les l’effet des fausses recommandations. Nous présentons le concept de maturité de rapport qui permet aux noeuds d’améliorer l’efficacité du modèle dans les réseaux mobiles. Nous montrons l’exactitude de notre modèle dans un réseau ad hoc de communication directe par des simulations en utilisant un simulateur développé pour notre modèle. L’analyse a, alors, été étendue aux réseaux mobiles ad hoc multisaut, montrant les avantages d’employer le concept de rapport de maturité. Finalement, nous évaluons l’impact des noeuds malveillants qui envoient de fausses recommandations afin de dégrader l’efficacité du modèle de confiance. Les résultats montrent que notre modèle tolère jusqu’à 40% de noeuds malveillants.
Style APA, Harvard, Vancouver, ISO itp.
10

Kwong, Mylène D. "Transmission efficace en temps réel de la voix sur réseaux ad hoc sans fil". Thèse, Université de Sherbrooke, 2008. http://savoirs.usherbrooke.ca/handle/11143/1827.

Pełny tekst źródła
Streszczenie:
La téléphonie mobile se démocratise et de nouveaux types de réseaux voient le jour, notamment les réseaux ad hoc. Sans focaliser exclusivement sur ces réseaux particuliers, le nombre de communications vocales effectuées chaque minute est en constante augmentation mais les réseaux sont encore souvent victimes d'erreurs de transmission. L'objectif de cette thèse porte sur l'utilisation de méthodes de codage en vue d'une transmission de la voix robuste face aux pertes de paquets, sur un réseau mobile et sans fil perturbé permettant le multichemin. La méthode envisagée prévoit l'utilisation d'un codage en descriptions multiples (MDC) appliqué à un flux de données issu d'un codec de parole bas débit, plus particulièrement l'AMR-WB (Adaptive Multi Rate - Wide Band). Parmi les paramètres encodés par l'AMR-WB, les coefficients de la prédiction linéaire sont calculés une fois par trame, contrairement aux autres paramètres qui sont calculés quatre fois. La problématique majeure réside dans la création adéquate de descriptions pour les paramètres de prédiction linéaire. La méthode retenue applique une quantification vectorielle conjuguée à quatre descriptions. Pour diminuer la complexité durant la recherche, le processus est épaulé d'un préclassificateur qui effectue une recherche localisée dans le dictionnaire complet selon la position d'un vecteur d'entrée. L'application du modèle de MDC à des signaux de parole montre que l'utilisation de quatre descriptions permet de meilleurs résultats lorsque le réseau est sujet à des pertes de paquets. Une optimisation de la communication entre le routage et le processus de création de descriptions mène à l'utilisation d'une méthode adaptative du codage en descriptions. Les travaux de cette thèse visaient la retranscription d'un signal de parole de qualité, avec une optimisation adéquate des ressources de stockage, de la complexité et des calculs. La méthode adaptative de MDC rencontre ces attentes et s'avère très robuste dans un contexte de perte de paquets.
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Ad-hoc Collaboration"

1

A review of disaster medical preparedness: Improving coordination and collaboration in the delivery of medical assistance during disasters : hearing before the Ad Hoc Subcommittee on State, Local, and Private Sector Preparedness and Integration of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Eleventh Congress, second session, July 22, 2010. Washington: U.S. G.P.O., 2011.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Border corruption: Assessing Customs and Border Protection and the Department of Homeland Security Inspector General's Office collaboration in the fight to prevent corruption : hearing before the Ad Hoc Subcommittee on Disaster Recovery and Intergovernmental Affairs of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Twelfth Congress, first session, June 9, 2011. Washington: U.S. G.P.O., 2011.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Collaborative Services in an Ad Hoc Wireless Network. Storming Media, 2004.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Ad-hoc Collaboration"

1

Reuter, Christian. "Scenario B: Ad Hoc Participation in Mobile Collaboration (TOCHI)". W Emergent Collaboration Infrastructures, 109–33. Wiesbaden: Springer Fachmedien Wiesbaden, 2015. http://dx.doi.org/10.1007/978-3-658-08586-5_8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Cai, Lin, Jianping Pan, Xuemin Shen i Jon W. Mark. "Peer Collaboration in Wireless Ad Hoc Networks". W NETWORKING 2005. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems, 840–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11422778_68.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Kedji, Komlan Akpédjé, Bernard Coulette, Redouane Lbath i Mahmoud Nassar. "Modeling Ad-Hoc Collaboration for Automated Process Support". W Lecture Notes in Business Information Processing, 205–16. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27213-4_14.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Nittel, Silvia, Christopher Dorr i John C. Whittier. "LocalAlert: Simulating Decentralized Ad-Hoc Collaboration in Emergency Situations". W Geographic Information Science, 146–59. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33024-7_11.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Lorch, Markus, i Dennis Kafura. "Supporting Secure Ad-hoc User Collaboration in Grid Environments". W Grid Computing — GRID 2002, 181–93. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-36133-2_16.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Lorre, Jean-Pierre, Yiannis Verginadis, Nikos Papageorgiou i Nicolas Salatge. "Ad-hoc Execution of Collaboration Patterns using Dynamic Orchestration". W Enterprise Interoperability IV, 3–12. London: Springer London, 2010. http://dx.doi.org/10.1007/978-1-84996-257-5_1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Ghazzai, Hakim, Elias Yaacoub, Abdullah Kadri i Mohamed-Slim Alouini. "Multi-operator Collaboration for Green Cellular Networks". W Energy Management in Wireless Cellular and Ad-hoc Networks, 97–122. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-27568-0_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Ens, Barrett, Eyal Ofek, Neil Bruce i Pourang Irani. "Shared Façades: Surface-Embedded Layout Management for Ad Hoc Collaboration Using Head-Worn Displays". W Collaboration Meets Interactive Spaces, 153–76. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-45853-3_8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Maurya, Ghyani Umesh Kumar, i Sushil Kumar. "Cooperation Enforcement and Collaboration Inducement in Mobile Ad Hoc Networks". W Intelligent Computing, Networking, and Informatics, 221–31. New Delhi: Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1665-0_21.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Guan, Zhenyu, Jiawei Li, Hao Liu i Dawei Li. "A Wearable Ad Hoc Device for Situational Awareness and Trusted Collaboration". W Smart Blockchain, 11–20. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34083-4_2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Ad-hoc Collaboration"

1

Kortuem, Gerd, Hans-Werner Gellersen i Mark Billinghurst. "Mobile ad hoc collaboration". W CHI '02 extended abstracts. New York, New York, USA: ACM Press, 2002. http://dx.doi.org/10.1145/506443.506665.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Maamar, Z., Q. H. Mahmoud i A. Derhab. "On Promoting Ad-Hoc Collaboration Among Messengers". W 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06). IEEE, 2006. http://dx.doi.org/10.1109/aina.2006.247.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Hegde, Rajesh, i Prasun Dewan. "Connecting Programming Environments to Support Ad-Hoc Collaboration". W 2008 23rd IEEE/ACM International Conference on Automated Software Engineering. IEEE, 2008. http://dx.doi.org/10.1109/ase.2008.28.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Nakae, Masayuki, Xinwen Zhang i Ravi Sandhu. "A general design towards secure ad-hoc collaboration". W the 2006 ACM Symposium. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1128817.1128874.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Deng, Lingli, Yeping He i Ziyao Xu. "Enforcing Separation of Duty in Ad Hoc Collaboration". W 2008 9th International Conference for Young Computer Scientists (ICYCS). IEEE, 2008. http://dx.doi.org/10.1109/icycs.2008.131.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Maamar, Z., Q. H. Mahmoud, A. Derhab i W. Mansoor. "Ad-Hoc Collaboration Between Messengers: Operations and Incentives". W 7th International Conference on Mobile Data Management (MDM'06). IEEE, 2006. http://dx.doi.org/10.1109/mdm.2006.29.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Alcántara, Jesús Muñoz, Panos Markopoulos i Mathias Funk. "Social Media as ad hoc Design Collaboration Tools". W ECCE '15: European Conference on Cognitive Ergonomics 2015. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2788412.2788420.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Malik, Ashfaq Ahmed, Muhammad Adil Khan, Athar Mahboob i Faraz Haider. "Secure geo-sharing in mobile ad-hoc networks". W 2012 International Conference on Collaboration Technologies and Systems (CTS). IEEE, 2012. http://dx.doi.org/10.1109/cts.2012.6261041.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Alqallaf, Maha, i Bin Wang. "Software defined collaborative secure ad hoc wireless networks". W 2015 International Conference on Collaboration Technologies and Systems (CTS). IEEE, 2015. http://dx.doi.org/10.1109/cts.2015.7210421.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Cheng, Qi, i Eric Chan Tin. "Efficient Routing and Scheduling in Ad-Hoc Cognitive Radio Networks". W 2014 National Wireless Research Collaboration Symposium (NWRCS). IEEE, 2014. http://dx.doi.org/10.1109/nwrcs.2014.11.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Ad-hoc Collaboration"

1

Ahn, Gail-Joon. Assured Resource Sharing in Ad-Hoc Collaboration. Office of Scientific and Technical Information (OSTI), grudzień 2015. http://dx.doi.org/10.2172/1240145.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Seybold, Patricia. Needed: Ad Hoc Collaborative Services. Boston, MA: Patricia Seybold Group, styczeń 2003. http://dx.doi.org/10.1571/psgp1-30-03cc.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii