Sciweavers

8080 search results - page 1345 / 1616
» From Computer Networks to Agent Networks
Sort
View
ICNSC
2007
IEEE
15 years 11 months ago
A Smart Vision Sensor for Detecting Risk Factors of a Toddler's Fall in a Home Environment
This paper presents a smart vision sensor for environmental hazards (such as slippery surfaces) and detecting risk factors of a toddler's fall in an indoor home perilous activ...
Hana Na, Sheng Feng Qin, David Wright
PADS
2004
ACM
15 years 10 months ago
Simulation Validation Using Direct Execution of Wireless Ad-Hoc Routing Protocols
Computer simulation is the most common approach to studying wireless ad-hoc routing algorithms. The results, however, are only as good as the models the simulation uses. One shoul...
Jason Liu, Yougu Yuan, David M. Nicol, Robert S. G...
ICSOC
2004
Springer
15 years 10 months ago
Assured service quality by improved fault management
The paradigm shift from device-oriented to service-oriented management has also implications to the area of event correlation. Today’s event correlation mainly addresses the cor...
Andreas Hanemann, Martin Sailer, David Schmitz
IEEEPACT
1998
IEEE
15 years 9 months ago
Sirocco: Cost-Effective Fine-Grain Distributed Shared Memory
Software fine-grain distributed shared memory (FGDSM) provides a simplified shared-memory programming interface with minimal or no hardware support. Originally software FGDSMs tar...
Ioannis Schoinas, Babak Falsafi, Mark D. Hill, Jam...
164
Voted
WISEC
2010
ACM
15 years 5 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
« Prev « First page 1345 / 1616 Last » Next »