Sciweavers

696 search results - page 129 / 140
» Mobile interfaces to computational, data, and service grid s...
Sort
View
SAC
2005
ACM
15 years 3 months ago
Survey of semantic annotation platforms
The realization of the Semantic Web requires the widespread availability of semantic annotations for existing and new documents on the Web. Semantic annotations are to tag ontolog...
Lawrence H. Reeve, Hyoil Han
PERCOM
2010
ACM
15 years 1 months ago
A comparative study of DECT and WLAN signals for indoor localization
—While there is more to context than location, localization and positioning must continue to be improved. Location-aware applications, such as Google Latitude, are enjoying great...
Matthias Kranz, Carl Fischer, Albrecht Schmidt
ICS
2003
Tsinghua U.
15 years 2 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
COMPUTER
2000
128views more  COMPUTER 2000»
14 years 9 months ago
What's Ahead for Embedded Software?
hysical world. How do you adapt software abstractions designed merely to transform data to meet requirements like real-time constraints, concurrency, and stringent safety considera...
Edward A. Lee
INTERNET
2002
145views more  INTERNET 2002»
14 years 9 months ago
Where is Middleware?
stract level, remote procedure calls enable programmers to invoke (possibly remote) services as if they were intra-application procedure calls. Much like function or procedure call...
Steve Vinoski