Sciweavers

10044 search results - page 1942 / 2009
» Authentication in Wireless Networks
Sort
View
WWIC
2004
Springer
124views Communications» more  WWIC 2004»
15 years 9 months ago
Mobility-Aware Rendezvous Point for Mobile Multicast Sources
: Current multicast routing protocols have not been designed for mobile nodes and especially roaming sources. Using the remote subscription as basis, we develop a new approach base...
Imed Romdhani, Mounir Kellil, Hong-Yon Lach, Abdel...
CODES
2003
IEEE
15 years 9 months ago
Synthesis of real-time embedded software with local and global deadlines
Current methods cannot synthesize real-time embedded software applications when the global deadline of a task is shorter than the total of all local deadlines along a critical pat...
Pao-Ann Hsiung, Cheng-Yi Lin
DSRT
2003
IEEE
15 years 9 months ago
Real Time Inspection of Hidden Worlds
“Smart Things” are commonly understood as wireless ad-hoc networked, mobile, autonomous, special purpose computing appliances, usually interacting with their environment impli...
Alois Ferscha, Markus Keller
HICSS
2003
IEEE
200views Biometrics» more  HICSS 2003»
15 years 9 months ago
A Dynamic Assignment Problem in a Mobile System with Limited Bandwidth
The assignment problem originally arising from parallel and distributed computing has been investigated intensively since the 70’s when Harold Stone proposed a method to solve i...
Yang Wang 0006, Thomas Kunz
ICRA
2003
IEEE
102views Robotics» more  ICRA 2003»
15 years 9 months ago
Two-dimensional signal transmission technology for robotics
The forms of communication available now are categorized into the one or three dimensional. One dimensional communication includes metal wires and optical fibers in which the elec...
Hiroyuki Shinoda, Naoya Asamura, Mitsuhiro Hakozak...
« Prev « First page 1942 / 2009 Last » Next »