Sciweavers

5470 search results - page 930 / 1094
» Enterprise Information Architecture
Sort
View
MSWIM
2006
ACM
15 years 7 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
134
Voted
PEWASUN
2006
ACM
15 years 7 months ago
Wave propagation using the photon path map
In wireless network planning, much effort is spent on the improvement of the network and transport layer – especially for Mobile Ad Hoc Networks. Although in principle realworl...
Arne Schmitz, Leif Kobbelt
SIGCOMM
2006
ACM
15 years 7 months ago
XORs in the air: practical wireless network coding
— This paper proposes COPE, a new architecture for wireless mesh networks. In addition to forwarding packets, routers mix (i.e., code) packets from different sources to increase ...
Sachin Katti, Hariharan Rahul, Wenjun Hu, Dina Kat...
VRCAI
2006
ACM
15 years 7 months ago
A foveal inset for large display environments
We introduce a system that adds a foveal inset to large-scale projection displays. The effective resolution of the foveal inset projection is higher than the original display reso...
Oliver G. Staadt, Benjamin A. Ahlborn, Oliver Krey...
WIKIS
2006
ACM
15 years 7 months ago
Wikis of locality: insights from the open guides
In this paper we describe an emerging form of wikis - wikis of locality – that support physical rather than virtual communities. We draw on our experience as administrators of t...
Mark Gaved, Tom Heath, Marc Eisenstadt