Sciweavers

1334 search results - page 231 / 267
» Application Characterization for Wireless Network Power Mana...
Sort
View
POLICY
2009
Springer
15 years 6 months ago
Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers
—There are increasing capabilities and demands for the remote monitoring of homes and their occupants. There are a variety of options for the architecture of such monitoring syst...
Carl A. Gunter
COMPCON
1994
IEEE
15 years 4 months ago
The Newton Operating System
The Newton MessagePad Personal Digital Assistant (PDA) is the first in a class of devices distinguished by their pen-based user interface, communications capability, small size, a...
Robert Welland, Greg Seitz, Lieh-Wuu Wang, Landon ...
PERCOM
2008
ACM
15 years 11 months ago
Estimating the Energy Consumption in Pervasive Java-Based Systems
We define and evaluate a framework for estimating the energy consumption of pervasive Java-based software systems. The framework's primary objective is to enable an engineer ...
Chiyoung Seo, Sam Malek, Nenad Medvidovic
PERCOM
2007
ACM
15 years 11 months ago
XCML: A Runtime Representation for the Context Modelling Language
The Context Modelling Language (CML), derived from Object Role Modeling (ORM), is a powerful approach for capturing the pertinent object types and relationships between those type...
Ricky Robinson, Karen Henricksen, Jadwiga Indulska
TMC
2010
89views more  TMC 2010»
14 years 10 months ago
SIP-Based IMS Signaling Analysis for WiMax-3G Interworking Architectures
—The third-generation partnership project (3GPP) and 3GPP2 have standardized the IP multimedia subsystem (IMS) to provide ubiquitous and access network-independent IP-based servi...
Arslan Munir, Ann Gordon-Ross