Sciweavers

2607 search results - page 451 / 522
» On the Architecture of System Verification Environments
Sort
View
HUC
2004
Springer
15 years 3 months ago
Reminding About Tagged Objects Using Passive RFIDs
People often misplace objects they care about. We present a system that generates reminders about objects left behind by tagging those objects with passive RFID tags. Readers posit...
Gaetano Borriello, Waylon Brunette, Matthew Hall, ...
SEM
2004
Springer
15 years 3 months ago
PlanetSim: A New Overlay Network Simulation Framework
Abstract. Current research in peer to peer systems is lacking appropriate environments for simulation and experimentation of large scale overlay services. This has led to a plethor...
Pedro García López, Carles Pairot, R...
COOPIS
2003
IEEE
15 years 3 months ago
Porting OMTTs to CORBA
The Common Object Request Broker Architecture standardizes a platform- and programming-language-independent distributed object computing environment. It also provides a standard fo...
Raul Silaghi, Alfred Strohmeier, Jörg Kienzle
HICSS
2003
IEEE
156views Biometrics» more  HICSS 2003»
15 years 3 months ago
Developing Video Services for Mobile Users
Video information, image processing and computer vision techniques are developing rapidly nowadays because of the availability of acquisition, processing and editing tools, which ...
Mohamed Ahmed, Roger Impey, Ahmed Karmouch
HOTOS
2003
IEEE
15 years 3 months ago
Certifying Program Execution with Secure Processors
Cerium is a trusted computing architecture that protects a program’s execution from being tampered while the program is running. Cerium uses a physically tamperresistant CPU and...
Benjie Chen, Robert Morris