Sciweavers

1726 search results - page 204 / 346
» A novel approach to mobility management
Sort
View
ACSAC
2004
IEEE
15 years 1 months ago
Using Predators to Combat Worms and Viruses: A Simulation-Based Study
Large-scale attacks generated by fast-spreading or stealthy malicious mobile code, such as flash worms and e-mail viruses, demand new approaches to patch management and disinfecti...
Ajay K. Gupta 0002, Daniel C. DuVarney
JUCS
2010
154views more  JUCS 2010»
14 years 8 months ago
An Ambient Assisted Living Platform Integrating RFID Data-on-Tag Care Annotations and Twitter
: Although RFID is mainly used to identify objects whose data can then be accessed over the network, passive HF RFID tags do have significant data storage capacity (up to 4K), whic...
Diego López-de-Ipiña, Ignacio D&iacu...
SIGUCCS
2003
ACM
15 years 3 months ago
It takes a village to build an image
Managing operating systems and campus-supported software can be a daunting challenge. Many colleges and universities handle these challenges by using disk imaging software to crea...
R. Mark Koan, Kelly Caye, Steven K. Brawn
ICVS
2001
Springer
15 years 2 months ago
A Fault-Tolerant Distributed Vision System Architecture for Object Tracking in a Smart Room
Abstract. In recent years, distributed computer vision has gained a lot of attention within the computer vision community for applications such as video surveillance and object tra...
Deepak R. Karuppiah, Zhigang Zhu, Prashant J. Shen...
MOBISYS
2004
ACM
15 years 9 months ago
Improving the Latency of 802.11 hand-offs using Neighbor Graphs
The 802.11 IEEE Standard has enabled low cost and effective wireless LAN services (WLAN). With the sales and deployment of WLAN based networks exploding, many people believe that ...
Minho Shin, Arunesh Mishra, William A. Arbaugh