Sciweavers

2392 search results - page 193 / 479
» Channel-Hopping Multiple Access
Sort
View
INFOCOM
2007
IEEE
15 years 8 months ago
Mutual Anonymous Communications: A New Covert Channel Based on Splitting Tree MAC
—Known covert channel based on splitting algorithms in Medium Access Control (MAC) protocols requires the receiver’s knowledge of the sender’s identity. In this paper we pres...
Zhenghong Wang, Jing Deng, Ruby B. Lee
98
Voted
IUI
2004
ACM
15 years 7 months ago
TUISTER: a tangible UI for hierarchical structures
Tangible user interfaces provide access to virtual information through intuitive physical manipulation. However, feedback is mostly provided by displays in the environment instead...
Andreas Butz, Markus H. Gross, Antonio Krüger
LAWEB
2003
IEEE
15 years 7 months ago
Application Modeling for the Semantic Web
In this article we present a method for the design and implementation of Web Applications for the Semantic Web. Based on the "Object Oriented Hypermedia Design Method" a...
Fernanda Lima, Daniel Schwabe
EDOC
2002
IEEE
15 years 6 months ago
Constraint Based Network Adaptation for Ubiquitous Applications
In this paper, we present a constraint-based approach for selecting and deploying active network components, called proxylets, which execute on servers within the network to perfo...
Krish T. Krishnakumar, Morris Sloman
DAC
1997
ACM
15 years 6 months ago
Electronic Component Information Exchange (ECIX)
A number of industry trends are shaping the requirements for IC and electronic equipment design. The density and complexity of circuit technologies have increased to a point where...
Donald R. Cottrell