Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
GI
2005
Springer
11 years 3 months ago
Distributed User Modeling for Situated Interaction
: A distributed service to model and control contextual information in mobile and ubiquitous computing environments is presented in this paper. We introduce the general user model ...
Dominik Heckmann
GI
2005
Springer
11 years 3 months ago
SPI-Workbench - Modellierung, Analyse und Optimierung eingebetteter Systeme
: Das SPI-Modell dient zur Repr¨asentation von heterogenen eingebetteten Systemen. Basierend auf diesem Modell wurde in einem Forschungsverbund zwischen der TU Braunschweig, der U...
Christian Haubelt, Marek Jersak, Kai Richter, Kars...
GI
2005
Springer
11 years 3 months ago
On the Signaling Overhead in Dynamic OFDMA Wireless Systems
: It is well known that dynamic OFDMA systems potentially increase the spectral efficiency of wireless systems. They exploit diversity effects in time, space, and frequency by ass...
James Gross, Adam Wolisz, Hans-Florian Geerdes
GI
2005
Springer
11 years 3 months ago
Wissensarten und Techniken im Anforderungsmanagement
: Das Anforderungsmanagement ist eine wissensintensive Aktivität bei der Entwicklung von Anwendungssystemen. In diesem Beitrag werden Wissensarten und typische Probleme im Rahmen ...
Matthias Goeken
GI
2005
Springer
11 years 3 months ago
Transporting Real-time Media Over the Internet
: Die Internet-Übertragung von Echtzeit-Medien stellt besondere Anforderungen an Codierung, Transport-Mechanismen und System-Architektur. Es muss geringe Latenz und hohe Wiedergab...
Bernd Girod
GI
2005
Springer
11 years 3 months ago
A new approach towards authenticated key agreement schemes for resource-constrained devices
: This paper describes a novel solution for authenticated key agreement for wireless sensor networks (WSN) in logistics. The retrieved data may not be spoofed as it is used to gene...
Christian Gorecki, Christian Behrens, Rainer Laur
GI
2005
Springer
11 years 3 months ago
Security Extensions to MMARP Through Cryptographically Generated Addresses
: The MMARP protocol provides multicast routing in hybrid environments in which an ad hoc network is connected to the Internet. As many other routing protocols it was initially des...
Francisco J. Galera, Pedro M. Ruiz, Antonio F. G&o...
GI
2005
Springer
11 years 3 months ago
RFID middleware design - addressing both application needs and RFID constraints
: Radio Frequency Identification (RFID) technology has a lot of potential to bridge the gap between the virtual world of enterprise IT systems and the real world of products and l...
Christian Floerkemeier, Matthias Lampe
books