Sciweavers

807 search results - page 104 / 162
» Deploying and evaluating a location-aware system
Sort
View
RTAS
2006
IEEE
15 years 3 months ago
Estimating the Worst-Case Energy Consumption of Embedded Software
The evolution of battery technology is not being able to keep up with the increasing performance demand of mobile embedded systems. Therefore, battery life has become an important...
Ramkumar Jayaseelan, Tulika Mitra, Xianfeng Li
ACSAC
2005
IEEE
15 years 3 months ago
A Nitpicker's guide to a minimal-complexity secure GUI
Malware such as Trojan Horses and spyware remain to be persistent security threats that exploit the overly complex graphical user interfaces of today’s commodity operating syste...
Norman Feske, Christian Helmuth
ICMCS
2005
IEEE
105views Multimedia» more  ICMCS 2005»
15 years 3 months ago
Streaming layered encoded video using peers
Peer-to-peer video streaming has emerged as an important means to transport stored video. The peers are less costly and more scalable than an infrastructure-basedvideo streaming n...
Yanming Shen, Zhengye Liu, Shivendra S. Panwar, Ke...
IPPS
2005
IEEE
15 years 3 months ago
A Mutual Anonymous Peer-to-Peer Protocol Design
Peer-to-Peer (P2P) computing has become a popular application model because of its easy resource sharing pattern and powerful query search scheme. However, decentralized P2P archi...
Jinsong Han, Yunhao Liu, Li Xiao, Renyi Xiao, Lion...
PERVASIVE
2005
Springer
15 years 3 months ago
Towards Massively Multi-user Augmented Reality on Handheld Devices
Augmented Reality (AR) can naturally complement mobile computing on wearable devices by providing an intuitive interface to a three-dimensional information space embedded within ph...
Daniel Wagner, Thomas Pintaric, Florian Ledermann,...