Sciweavers

13180 search results - page 2515 / 2636
» Network Models
Sort
View
PERCOM
2005
ACM
16 years 2 months ago
Security Parallels between People and Pervasive Devices
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
Stephen A. Weis
MOBISYS
2008
ACM
16 years 2 months ago
Cascadia: a system for specifying, detecting, and managing rfid events
Cascadia is a system that provides RFID-based pervasive computing applications with an infrastructure for specifying, extracting and managing meaningful high-level events from raw...
Evan Welbourne, Nodira Khoussainova, Julie Letchne...
MOBISYS
2007
ACM
16 years 2 months ago
Context browsing with mobiles - when less is more
Except for a handful of "mobile" Web sites, the Web is designed for browsing with personal computers with large screens capable of fitting the content of most Web pages....
Yevgen Borodin, Jalal Mahmud, I. V. Ramakrishnan
MOBISYS
2003
ACM
16 years 2 months ago
Energy Aware Lossless Data Compression
Wireless transmission of a bit can require over 1000 times more energy than a single 32-bit computation. It would therefore seem desirable to perform significant computation to re...
Kenneth C. Barr, Krste Asanovic
EUROGRAPHICS
2010
Eurographics
15 years 11 months ago
TouchTone: Interactive Local Image Adjustment Using Point-and-Swipe
Recent proliferation of camera phones, photo sharing and social network services has significantly changed how we process our photos. Instead of going through the traditional dow...
Chia-Kai Liang, Wei-Chao Chen, Natasha Gelfand
« Prev « First page 2515 / 2636 Last » Next »