Sciweavers

2111 search results - page 75 / 423
» How to Program Pervasive Systems
Sort
View
154
Voted
PERCOM
2010
ACM
14 years 7 months ago
Using Wi-Fi to save energy via P2P remote execution
Abstract-- Mobile devices are becoming increasingly powerful with regards to processing speed, networking capabilities, storage capacity etc. While these improvements open up new p...
Mads Darø Kristensen, Niels Olof Bouvin
98
Voted
SAC
2002
ACM
15 years 6 days ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
83
Voted
IWPC
2006
IEEE
15 years 6 months ago
Dynamic Data Structure Analysis for Java Programs
Analysis of dynamic data structure usage is useful for both program understanding and for improving the accuracy of other program analyses. Static analysis techniques, however, su...
Sokhom Pheng, Clark Verbrugge
115
Voted
ICPPW
2006
IEEE
15 years 6 months ago
A Toolkit-Based Approach to Indoor Localization
Location is one of the most important contexts used in the applications in the pervasive computing environments . It helps the application do the right thing at the right place. O...
Yu Wang, Adam Harder
WCRE
2006
IEEE
15 years 6 months ago
An Industrial Case Study of Program Artifacts Viewed During Maintenance Tasks
Research on maintenance task structure modeling has so far examined only how often program artifacts are modified, and what information can be deduced from modification records....
Lijie Zou, Michael W. Godfrey