Sciweavers

942 search results - page 159 / 189
» Telecommunications Networks
Sort
View
WSC
2004
14 years 11 months ago
Evaluation of Secure Peer-to-Peer Overlay Routing for Survivable SCADA Systems
Supervisory Control And Data Acquisition (SCADA) systems gather and analyze data for real-time control. SCADA systems are used extensively, in applications such as electrical powe...
Jeffrey J. Farris, David M. Nicol
COMCOM
2008
153views more  COMCOM 2008»
14 years 9 months ago
A TTP-free protocol for location privacy in location-based services
Location-based services (LBS) will be a keystone of the new information society that is founded on the information and communications technologies (ICTs). Mobile devices such as c...
Agusti Solanas, Antoni Martínez-Ballest&eac...
PERCOM
2010
ACM
14 years 7 months ago
A tool suite to prototype pervasive computing applications
Abstract--Despite much progress, developing a pervasive computing application remains a challenge because of a lack of conceptual frameworks and supporting tools. This challenge in...
Damien Cassou, Julien Bruneau, Charles Consel
TSD
2010
Springer
14 years 7 months ago
Embedded Speech Recognition in UPnP (DLNA) Environment
In the past decade great technological advances have been made in internet services, personal computers, telecommunications, media and entertainment. Many of these advances have be...
Jozef Ivanecký, Radek Hampl
GLOBECOM
2007
IEEE
15 years 3 months ago
Hybrid Coherent and Frequency-Shifted-Reference Ultrawideband Radio
Ultrawideband communications often occur in heterogeneous networks where different receivers have different complexity and energy consumption requirements. In this case it is desi...
Huaping Liu, Andreas F. Molisch, Shiwei Zhao, Denn...