Sciweavers

8655 search results - page 1278 / 1731
» Challenges for Trusted Computing
Sort
View
PERCOM
2009
ACM
15 years 11 months ago
QoS Enabled Mobility Support for Mesh Networks
Abstract—Existing solutions for building wireless mesh networks suffer from reduced efficiency. This is due to lack of reliable self-configuration procedures that can dynamical...
Dario Gallucci, Silvia Giordano
HRI
2009
ACM
15 years 11 months ago
Field trial for simultaneous teleoperation of mobile social robots
Simultaneous teleoperation of mobile, social robots presents unique challenges, combining the real-time demands of conversation with the prioritized scheduling of navigational tas...
Dylan F. Glas, Takayuki Kanda, Hiroshi Ishiguro, N...
NPAR
2009
ACM
15 years 11 months ago
Appearance-guided synthesis of element arrangements by example
We present a technique for the analysis and re-synthesis of 2D arrangements of stroke-based vector elements. The capture of an artist’s style by the sole posterior analysis of h...
Thomas Hurtut, Pierre-Edouard Landes, Joëlle ...
POPL
2009
ACM
15 years 11 months ago
Speculative N-Way barriers
Speculative execution is an important technique that has historically been used to extract concurrency from sequential programs. While techniques to support speculation work well ...
Lukasz Ziarek, Suresh Jagannathan, Matthew Fluet, ...
EWSN
2009
Springer
15 years 11 months ago
DHV: A Code Consistency Maintenance Protocol for Multi-hop Wireless Sensor Networks
Ensuring that every sensor node has the same code version is challenging in dynamic, unreliable multi-hop sensor networks. When nodes have different code versions, the network may...
Thanh Dang, Nirupama Bulusu, Wu-chi Feng, Seungweo...
« Prev « First page 1278 / 1731 Last » Next »