Sciweavers

351 search results - page 54 / 71
» Building Secure and Reliable Network Applications
Sort
View
107
Voted
FGR
2008
IEEE
227views Biometrics» more  FGR 2008»
15 years 6 months ago
Ambient intelligence as the bridge to the future of pervasive computing
One prediction about this future of pervasive technology is that people will carry the tools needed to interface with technological resources sprinkled through out the environment...
Christopher Richard Wren, Yuri A. Ivanov
VTC
2008
IEEE
110views Communications» more  VTC 2008»
15 years 6 months ago
Performance Evaluation of Satellite-Based Search and Rescue Services: Galileo vs. Cospas-Sarsat
—The European satellite navigation system Galileo is a highly promising technology with communication capabilities providing an enhanced Search-and-Rescue (SAR) service in combin...
Andreas Lewandowski, Brian Niehoefer, Christian Wi...
MSWIM
2009
ACM
15 years 6 months ago
On providing location privacy for mobile sinks in wireless sensor networks
Wireless sensor networks have attracted increasing attentions considering their potentials for being widely adopted in both emerging civil and military applications. A common prac...
Edith C.-H. Ngai, Ioana Rodhe
NOSSDAV
2009
Springer
15 years 6 months ago
Robust live media streaming in swarms
Data dissemination in decentralized networks is often realized by using some form of swarming technique. Swarming enables nodes to gather dynamically in order to fulfill a certai...
Thomas Locher, Remo Meier, Roger Wattenhofer, Stef...
INFOCOM
2000
IEEE
15 years 4 months ago
Design, Implementation and Performance of a Content-Based Switch
Abstract— In this paper, we share our experience in designing and building a content based switch which we call L5. In addition to the layer 2-3-4 information available in the pa...
George Apostolopoulos, David Aubespin, Vinod G. J....