Sciweavers

PERCOM
2006
ACM
14 years 4 months ago
Semantic Indexing for Recorded Educational Lecture Videos
In this paper, we present a general architecture and a new retrieval method for an educational system that is based on a knowledge base of existing recorded lectures. The extracti...
Stephan Repp, Christoph Meinel
PERCOM
2006
ACM
14 years 4 months ago
On the Fly Service Composition for Local Interaction Environments
Dynamically creating new, composite services "on the fly" using existing ones in a local interaction environment (e.g. a home, meeting room, airport lounge, etc.) presen...
Hossein Pourreza, Peter Graham
PERCOM
2006
ACM
14 years 4 months ago
Reducing Configuration Overhead with Goal-oriented Programming
The rapid increase in the number and variety of consumer-level electronic devices without the corresponding development of device management technology has lead to a configuration ...
Justin Mazzola Paluska, Hubert Pham, Umar Saif, Ch...
PERCOM
2006
ACM
14 years 4 months ago
Molecular Communication for Health Care Applications
Molecular communication is a new communication paradigm and uses molecules as a communication carrier. In molecular communication, information is encoded onto molecules at senders...
Yuki Moritani, Satoshi Hiyama, Tatsuya Suda
PERCOM
2006
ACM
14 years 4 months ago
A Design of a Molecular Communication System for Nanomachines Using Molecular Motors
Molecular communication is one solution for nano-scale communication between nanomachines. Nanomachines (e.g., biological molecules, artificial devices) represent small devices or...
Michael Moore, Akihiro Enomoto, Tadashi Nakano, Ry...
PERCOM
2006
ACM
14 years 4 months ago
A Collusion Attack on Pairwise Key Predistribution Schemes for Distributed Sensor Networks
Key predistribution schemes are a favoured solution for establishing secure communication in sensor networks. Often viewed as the safest way to bootstrap trust, the main drawback ...
Tyler Moore
PERCOM
2006
ACM
14 years 4 months ago
Introducing History-Enriched Security Context Transfer to Enhance the Security of Subsequent Handover
Many solutions for securing inter-provider handover proposed to date make use of the concept of security context transfer. However, none of these solutions addresses problems aris...
Ulrike Meyer, Susanne Wetzel
PERCOM
2006
ACM
14 years 4 months ago
Integrated Voice and Haptic Support for Tele-Rehabilitation
In recent years, rapid technological advances have changed how many existing tasks are performed. For example, the combination of virtual environments and the Internet is presenti...
Margaret McLaughlin, Roger Zimmermann, Leslie S. L...
PERCOM
2006
ACM
14 years 4 months ago
Adaptive Medical Feature Extraction for Resource Constrained Distributed Embedded Systems
Tiny embedded systems have not been an ideal outfit for high performance computing due to their constrained resources. Limitations in processing power, battery life, communication ...
Roozbeh Jafari, Hyduke Noshadi, Majid Sarrafzadeh,...