Sciweavers

23557 search results - page 4227 / 4712
» Distributed Computing - Introduction
Sort
View
142
Voted
ECBS
2004
IEEE
102views Hardware» more  ECBS 2004»
15 years 8 months ago
WASP: A Radio Geolocation System on Highly Resource Constrained Mobile Platforms
In recent years, there has been an increased need for surveillance capabilities in both civilian and military arenas. Mobile unmanned sensor fleets have long been envisioned as a ...
Kumar Chhokra, Ted Bapty, Jason Scott, Simon Winbe...
EUROMICRO
2004
IEEE
15 years 8 months ago
Evaluation of Component Technologies with Respect to Industrial Requirements
We compare existing component technologies for embedded systems with respect to industrial requirements. The requirements are collected from the vehicular industry, but our findin...
Anders Möller, Mikael Åkerholm, Johan F...
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
15 years 8 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena
ECAI
2006
Springer
15 years 8 months ago
Logic Programs with Multiple Chances
Abstract. In human-like reasoning it often happens that different conditions, partially alternative and hierarchically structured, are mentally grouped in order to derive some conc...
Francesco Buccafurri, Gianluca Caminiti, Domenico ...
ECOWS
2006
Springer
15 years 8 months ago
Formal Modelling and Verification of an Asynchronous Extension of SOAP
Current web services are largely based on a synchronous request-response model that uses the Simple Object Access Protocol SOAP. Next-generation telecommunication networks, on the...
Maurice H. ter Beek, Stefania Gnesi, Franco Mazzan...
« Prev « First page 4227 / 4712 Last » Next »