Sciweavers

6112 search results - page 1158 / 1223
» Programmable mobile networks
Sort
View
MOBIDE
2006
ACM
15 years 11 months ago
Towards correcting input data errors probabilistically using integrity constraints
Mobile and pervasive applications frequently rely on devices such as RFID antennas or sensors (light, temperature, motion) to provide them information about the physical world. Th...
Nodira Khoussainova, Magdalena Balazinska, Dan Suc...
ACSAC
2005
IEEE
15 years 11 months ago
PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness
As evidenced by the proliferation of phishing attacks and keystroke loggers, we know that human beings are not wellequipped to make trust decisions about when to use their passwor...
Sara Sinclair, Sean W. Smith
LOCA
2005
Springer
15 years 11 months ago
The COMPASS Location System
The aim of COMPASS (short for COM mon Positioning Architecture for Several Sensors) is to realize a location infrastructure which can make use of a multitude of different sensors,...
Frank Kargl, Alexander Bernauer
ICDCSW
2003
IEEE
15 years 10 months ago
Autonomous Cooperation Technologies for Achieving Real Time Property and Fault Tolerance in Service Oriented Community System
The advancement of wireless communication and mobile telecommunication has made mobile commerce possible. In the retail business under the evolving market, the users would like to...
Naohiro Kaji, Khaled Ragab, Takanori Ono, Kinji Mo...
SAC
2009
ACM
15 years 10 months ago
Self-organized control of knowledge generation in pervasive computing systems
Pervasive computing devices (e.g., sensor networks, localization devices, cameras, etc.) are increasingly present in every aspect of our lives. These devices are able to generate ...
Gabriella Castelli, Ronaldo Menezes, Franco Zambon...
« Prev « First page 1158 / 1223 Last » Next »