Sciweavers

34181 search results - page 266 / 6837
» The Computer System GRAPHOGRAPH
Sort
View
HOTOS
2003
IEEE
15 years 4 months ago
Access Control to Information in Pervasive Computing Environments
Many types of information available in a pervasive computing environment, such as people location information, should be accessible only by a limited set of people. Some propertie...
Urs Hengartner, Peter Steenkiste
ISADS
2003
IEEE
15 years 4 months ago
A GUI Approach to Programming of TMO Frames and Design of Real-Time Distributed Computing Software
An advanced high-level approach for programming of real-time distributed computing applications, the TMO (Time-triggered Message-triggered Object) programming and specification sc...
K. H. Kim, Seok-Joong Kang
80
Voted
ISWC
2003
IEEE
15 years 4 months ago
Coarse, Inexpensive, Infrared Tracking for Wearable Computing
We present a novel, inexpensive, coarse tracking system that determines a person’s approximate 2D location and 1D head orientation in an indoor environment. While this coarse tr...
Drexel Hallaway, Tobias Höllerer, Steven Fein...
79
Voted
DATE
2010
IEEE
134views Hardware» more  DATE 2010»
15 years 4 months ago
Simultaneous budget and buffer size computation for throughput-constrained task graphs
Abstract—Modern embedded multimedia systems process multiple concurrent streams of data processing jobs. Streams often have throughput requirements. These jobs are implemented on...
Maarten Wiggers, Marco Bekooij, Marc Geilen, Twan ...
ACSAC
2000
IEEE
15 years 3 months ago
On Computer Viral Infection and the Effect of Immunization
Viruses remain a significant threat to modern networked computer systems. Despite the best efforts of those who develop anti-virus systems, new viruses and new types of virus that...
Chenxi Wang, John C. Knight, Matthew C. Elder