Sciweavers

5970 search results - page 1104 / 1194
» Management Information Model Engineering
Sort
View
143
Voted
ISEM
2008
129views more  ISEM 2008»
15 years 3 months ago
User requirements of mobile technology: results from a content analysis of user reviews
Advanced mobile technology continues to shape professional environments. Smart cell phones, pocket computers and laptop computers reduce the need of users to remain close to a wir...
Judith Gebauer, Ya Tang, Chaiwat Baimai
JCM
2006
73views more  JCM 2006»
15 years 3 months ago
Wireless Networks Revenue Optimization through Overload Control with Priority Services
Wireless networks are currently experiencing more overload situations than their wireline counterparts because of explosive mobile traffic growth, unpredictable traffic behavior, s...
Haitao Lin, Preetam Ghosh, Prabir Das
149
Voted
IJVR
2007
202views more  IJVR 2007»
15 years 3 months ago
Full Solid Angle Panoramic Viewing by Depth Image Warping on Field Programmable Gate Array
—To construct 3D virtual scenes from two-dimensional images with depth information, image warping techniques could be used. In this paper, a novel approach of cylindrical depth i...
Xiaoying Li, Baoquan Liu, Enhua Wu
TISSEC
2008
202views more  TISSEC 2008»
15 years 3 months ago
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
compromised sensor nodes. The framework provides an appropriate abstraction of applicationspecific detection mechanisms and models the unique properties of sensor networks. Based o...
Qing Zhang, Ting Yu, Peng Ning
129
Voted
JCM
2007
143views more  JCM 2007»
15 years 3 months ago
A Simple Privacy Protecting Scheme Enabling Delegation and Ownership Transfer for RFID Tags
— RFID (Radio frequency identification) technology raises many privacy concerns among which the potential tracking of an RFID tag bearer and the eventuality of an illegitimate r...
Sepideh Fouladgar, Hossam Afifi
« Prev « First page 1104 / 1194 Last » Next »