Sciweavers

1092 search results - page 34 / 219
» Located Operators
Sort
View
123
Voted
INFOCOM
2010
IEEE
14 years 11 months ago
Efficient Continuous Scanning in RFID Systems
RFID is an emerging technology with many potential applications such as inventory management for supply chain. In practice, these applications often need a series of continuous sca...
Bo Sheng, Qun Li, Weizhen Mao
SAC
2009
ACM
15 years 6 months ago
Autonomous networked robots for the establishment of wireless communication in uncertain emergency response scenarios
During a disaster, emergency response operations can benefit from the establishment of a wireless ad hoc network. We propose the use of autonomous robots that move inside a disas...
Stelios Timotheou, Georgios Loukas
HOTOS
2003
IEEE
15 years 6 months ago
Access Control to Information in Pervasive Computing Environments
Many types of information available in a pervasive computing environment, such as people location information, should be accessible only by a limited set of people. Some propertie...
Urs Hengartner, Peter Steenkiste
WWW
2001
ACM
16 years 2 months ago
Querying XML data: the DQL language
This poster describes the DQL language : a new XML data manipulation language. DQL is an extension of OQL for the manipulation of tree-like and forest-like data. It integrates XPa...
Emmanuel Bruno, Jacques Le Maitre, Elisabeth Muris...
89
Voted
ASAP
2008
IEEE
93views Hardware» more  ASAP 2008»
15 years 8 months ago
Memory copies in multi-level memory systems
Data movement operations, such as the C-style memcpy function, are often used to duplicate or communicate data. This type of function typically produces a significant amount of o...
Pepijn J. de Langen, Ben H. H. Juurlink