Sciweavers

8770 search results - page 1553 / 1754
» Named Service Networking
Sort
View
PERCOM
2010
ACM
14 years 9 months ago
Towards the adaptive integration of multiple context reasoners in pervasive computing environments
Abstract—The pervasive computing vision consists in realizing ubiquitous technologies to support the execution of people’s everyday tasks by proactively providing appropriate i...
Daniele Riboni, Linda Pareschi, Claudio Bettini
TCOM
2010
220views more  TCOM 2010»
14 years 9 months ago
Fiber fault PON monitoring using optical coding: Effects of customer geographic distribution
Abstract—We analyze the performance of fiber fault monitoring of a PON using a centralized, passive optical coding (OC) system. We develop an expression for the detected monitor...
Mohammad M. Rad, Habib Fathallah, Leslie A. Rusch
WS
2010
ACM
14 years 9 months ago
Anomalies in ontologies with rules
For the development of practical semantic applications, ontologies are commonly used with rule extensions. Prominent examples of semantic applications are Semantic Wikis, Semantic...
Joachim Baumeister, Dietmar Seipel
P2P
2010
IEEE
127views Communications» more  P2P 2010»
14 years 9 months ago
Waiting for Anonymity: Understanding Delays in the Tor Overlay
Although Tor is the most widely used overlay for providing anonymity services, its users often experience very high delays. Because much of Tor usage is for Web applications, which...
Prithula Dhungel, Moritz Steiner, Ivinko Rimac, Vo...
SAICSIT
2010
ACM
14 years 9 months ago
Towards energy efficient mobile communications
The rapid growth and development of wireless communication services and applications corresponds to an increase in associated energy consumption. For broadband wireless network de...
Moshe T. Masonta, Mjumo Mzyece, Ntsibane Ntlatlapa
« Prev « First page 1553 / 1754 Last » Next »