Sciweavers

22864 search results - page 4400 / 4573
» An Integrated and
Sort
View
133
Voted
CORR
2010
Springer
121views Education» more  CORR 2010»
15 years 1 months ago
GNSS-based positioning: Attacks and Countermeasures
Increasing numbers of mobile computing devices, user-portable, or embedded in vehicles, cargo containers, or the physical space, need to be aware of their location in order to prov...
P. Papadimitratos, A. Jovanovic
CORR
2010
Springer
88views Education» more  CORR 2010»
15 years 1 months ago
Kinematic modelling of a 3-axis NC machine tool in linear and circular interpolation
Machining time is a major performance criterion when it comes to high speed machining. CAM software can help in estimating that time for a given strategy. But in practice, CAM pro...
Xavier Pessoles, Yann Landon, Walter Rubio
CORR
2010
Springer
186views Education» more  CORR 2010»
15 years 1 months ago
Capacitated Caching Games
Capacitated Caching (CC) Games are motivated by P2P and web caching applications, and involve nodes on a network making strategic choices regarding the content to replicate in the...
Ragavendran Gopalakrishnan, Dimitrios Kanoulas, Na...
CORR
2008
Springer
112views Education» more  CORR 2008»
15 years 1 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...
CORR
2008
Springer
152views Education» more  CORR 2008»
15 years 1 months ago
Characterizing User Mobility in Second Life
In this work we present a measurement study of user mobility in Second Life. We first discuss different techniques to collect user traces and then focus on results obtained using ...
Chi-Anh La, Pietro Michiardi
« Prev « First page 4400 / 4573 Last » Next »