Sciweavers

8655 search results - page 1526 / 1731
» Challenges for Trusted Computing
Sort
View
85
Voted
SENSYS
2009
ACM
15 years 5 months ago
Mercury: a wearable sensor network platform for high-fidelity motion analysis
This paper describes Mercury, a wearable, wireless sensor platform for motion analysis of patients being treated for neuromotor disorders, such as Parkinson’s Disease, epilepsy,...
Konrad Lorincz, Bor-rong Chen, Geoffrey Werner Cha...
89
Voted
VEE
2009
ACM
246views Virtualization» more  VEE 2009»
15 years 5 months ago
Tracing for web 3.0: trace compilation for the next generation web applications
Today’s web applications are pushing the limits of modern web browsers. The emergence of the browser as the platform of choice for rich client-side applications has shifted the ...
Mason Chang, Edwin W. Smith, Rick Reitmaier, Micha...
78
Voted
ICCSA
2009
Springer
15 years 5 months ago
VC-GTS: Virtual Cut-Through GTS Allocation Scheme for Voice Traffic in Multihop IEEE 802.15.4 Systems
Supporting multimedia traffic is one of the major challenges for the next generation of wireless personal area networks (WPANs). Especially, the IEEE 802.15.4 WPAN standards specif...
Junwoo Jung, Hoki Baek, Jaesung Lim
105
Voted
CEC
2009
IEEE
15 years 5 months ago
Enhancing MOEA/D with guided mutation and priority update for multi-objective optimization
—Multi-objective optimization is an essential and challenging topic in the domains of engineering and computation because real-world problems usually include several conflicting...
Chih-Ming Chen, Ying-Ping Chen, Qingfu Zhang
93
Voted
CSE
2009
IEEE
15 years 5 months ago
First Steps to Netviz Nirvana: Evaluating Social Network Analysis with NodeXL
—Social Network Analysis (SNA) has evolved as a popular, standard method for modeling meaningful, often hidden structural relationships in communities. Existing SNA tools often i...
Elizabeth M. Bonsignore, Cody Dunne, Dana Rotman, ...
« Prev « First page 1526 / 1731 Last » Next »