Sciweavers

4985 search results - page 213 / 997
» Re-Configurable Computing in Wireless
Sort
View
CONEXT
2010
ACM
15 years 2 months ago
Assessing the vulnerability of replicated network services
Client-server networks are pervasive, fundamental, and include such key networks as the Internet, power grids, and road networks. In a client-server network, clients obtain a serv...
George Dean Bissias, Brian Neil Levine, Ramesh K. ...
MOBIHOC
2010
ACM
15 years 2 months ago
Identifying the missing tags in a large RFID system
Comparing with the classical barcode system, RFID extends the operational distance from inches to a number of feet (passive RFID tags) or even hundreds of feet (active RFID tags)....
Tao Li, Shigang Chen, Yibei Ling
WIOPT
2010
IEEE
15 years 2 months ago
Characterizing high-bandwidth real-time video traffic in residential broadband networks
Users are generating and uploading multimedia content to the Internet at an unprecedented rate. Residential broadband networks, however, have low upload capacities and large packet...
Ramya Raghavendra, Elizabeth M. Belding
WIOPT
2010
IEEE
15 years 2 months ago
Saluki: A high-performance Wi-Fi sniffing program
Building a campus-wide wireless LAN measurement system faces many efficiency, scalability and security challenges. To address these challenges, we developed a distributed Wi-Fi sni...
Keren Tan, David Kotz
GI
2009
Springer
15 years 1 months ago
Using Semantic UI Descriptions for Adaptive Mobile Games
: In recent years, mobile devices became more and more powerful, wireless Internet access is becoming standard. To support mobile applications adapting their User Interface to vari...
Pascal Bihler, Holger Mügge, Mark Schmatz, Ar...