Sciweavers

1751 search results - page 278 / 351
» Search on mobile phones
Sort
View
ENTCS
2007
115views more  ENTCS 2007»
14 years 9 months ago
Self Management and the Future of Software Design
Most software is fragile: even the slightest error, such as changing a single bit, can make it crash. As software complexity has increased, development techniques have kept pace t...
Peter Van Roy
PERVASIVE
2008
Springer
14 years 9 months ago
Cooperative Techniques Supporting Sensor-Based People-Centric Inferencing
Abstract. People-centric sensor-based applications targeting mobile device users offer enormous potential. However, learning inference models in this setting is hampered by the lac...
Nicholas D. Lane, Hong Lu, Shane B. Eisenman, Andr...
IPL
2007
113views more  IPL 2007»
14 years 9 months ago
Greedy online frequency allocation in cellular networks
The online frequency allocation problem for cellular networks has been well studied in these years. Given a mobile telephone network, whose geographical coverage area is divided i...
Joseph Wun-Tat Chan, Francis Y. L. Chin, Deshi Ye,...
INFOCOM
2010
IEEE
14 years 8 months ago
SparseTrack: Enhancing Indoor Pedestrian Tracking with Sparse Infrastructure Support
Abstract—Accurate indoor pedestrian tracking has wide applications in the healthcare, retail, and entertainment industries. However, existing approaches to indoor tracking have v...
Yunye Jin, Mehul Motani, Wee-Seng Soh, Juanjuan Zh...
TRUST
2010
Springer
14 years 8 months ago
Key Attestation from Trusted Execution Environments
Abstract. Credential platforms implemented on top of Trusted Execution Environments3 (TrEEs) allow users to store and use their credentials, e.g., cryptographic keys or user passwo...
Kari Kostiainen, Alexandra Dmitrienko, Jan-Erik Ek...