Sciweavers

10907 search results - page 2134 / 2182
» Constraint Based Strategies
Sort
View
WORDS
2003
IEEE
15 years 3 months ago
ORB Middleware Evolution for Networked Embedded Systems
Standards-based COTS middleware has been shown to be effective in meeting a range of functional and QoS requirements for distributed real-time and embedded (DRE) systems. Each sta...
Christopher D. Gill, Venkita Subramonian, Jeff Par...
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
15 years 3 months ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
NETGAMES
2003
ACM
15 years 3 months ago
Mobility and stability evaluation in wireless multi-hop networks using multi-player games
Plenty of work was contributed in the field of protocol design and performance evaluation of multi-hop networks. It is generally accepted that mobility has a huge impact on the p...
Frank H. P. Fitzek, Leonardo Badia, Michele Zorzi,...
SAC
2003
ACM
15 years 3 months ago
iGrocer- A Ubiquitous and Pervasive Smart Grocery Shopping System
Emerging Smart phones are poised to give a whole new dimension to the way we shop, bank, and go about many of our everyday activities. iGrocer is a smart grocery shopping assistant...
Sangeetha Shekar, Prashant Nair, Abdelsalam Helal
SACMAT
2003
ACM
15 years 3 months ago
Cooperative role-based administration
In large organizations the administration of access privileges (such as the assignment of an access right to a user in a particular role) is handled cooperatively through distribu...
Horst Wedde, Mario Lischka
« Prev « First page 2134 / 2182 Last » Next »