Sciweavers

20813 search results - page 421 / 4163
» Introduction to Computer Networking
Sort
View
PERCOM
2003
ACM
15 years 9 months ago
Interaction in Pervasive Computing Settings Using Bluetooth-Enabled Active Tags and Passive RFID Technology Together with Mobile
Passive RFID technology and unobtrusive Bluetoothenabled active tags are means to augment products and everyday objects with information technology invisible to human users. This ...
Frank Siegemund, Christian Floerkemeier
CCGRID
2007
IEEE
15 years 8 months ago
A Computer-Aided Diagnostic System using a Global Data Grid Repository for the Evaluation of Ultrasound Carotid Images
A computer-aided diagnostic (CAD) method of calculating lumen and wall thickness of carotid vessels is presented. The CAD is able to measure the geometry of the lumen and plaque s...
Marco Antonio Gutierrez, Silvia Helena Gelas Lage,...
CP
2007
Springer
15 years 8 months ago
Efficient Computation of Minimal Point Algebra Constraints by Metagraph Closure
Abstract. Computing the minimal network (or minimal CSP) representation of a given set of constraints over the Point Algebra (PA) is a fundamental reasoning problem. In this paper ...
Alfonso Gerevini, Alessandro Saetti
MOBISYS
2008
ACM
15 years 6 months ago
Transient customization of mobile computing infrastructure
Kimberley enables rapid software provisioning of fixed infrastructure for transient use by a mobile device. It uses virtual machine (VM) technology, but avoids the performance cha...
Adam Wolbach, Jan Harkes, Srinivas Chellappa, Maha...
TON
2008
125views more  TON 2008»
15 years 4 months ago
Two techniques for fast computation of constrained shortest paths
Abstract-- Computing constrained shortest paths is fundamental to some important network functions such as QoS routing, which is to find the cheapest path that satisfies certain co...
Shigang Chen, Meongchul Song, Sartaj Sahni