Sciweavers

879 search results - page 176 / 176
» Core schema mappings
Sort
View
SRDS
2010
IEEE
13 years 2 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
GIS
2010
ACM
12 years 11 months ago
Modelling spatial video as part of a GIS video analysis framework
It is now common for video; real-time and collected, mobile and static, to be georeferenced and stored in large archives for users of expert systems to access and interact with. I...
Paul Lewis
CSUR
2011
12 years 8 months ago
Programming wireless sensor networks: Fundamental concepts and state of the art
high-level programming abstractions, capable of simplifying the programming chore without sacrificing efficiency, has been long recognized and several solutions have been hitherto...
Luca Mottola, Gian Pietro Picco

Publication
232views
13 years 2 months ago
Measurement in 802.11 Wireless Networks and its Applications
Ease of deployment, wireless connectivity and ubiquitous mobile on-the-go computing has made the IEEE 802.11 the most widely deployed Wireless Local Area Network (WLAN) sta...
Malik Ahmad Yar Khan