Sciweavers

7526 search results - page 1314 / 1506
» The Design and Implementation of the A2QM3 System
Sort
View
WOWMOM
2009
ACM
157views Multimedia» more  WOWMOM 2009»
15 years 8 months ago
The CHIANTI architecture for robust mobile Internet access
The quality of Internet access for mobile users may suffer from highly variable communication characteristics (packet loss, delay, throughput) and from temporary disconnections. T...
Jörg Ott, Petri Ylikoski, Nils Seifert, Caleb...
98
Voted
EDBT
2010
ACM
147views Database» more  EDBT 2010»
15 years 8 months ago
A simple (yet powerful) algebra for pervasive environments
Querying non-conventional data is recognized as a major issue in new environments and applications such as those occurring in pervasive computing. A key issue is the ability to qu...
Yann Gripay, Frédérique Laforest, Je...
ACSAC
2008
IEEE
15 years 8 months ago
Automatic Inference and Enforcement of Kernel Data Structure Invariants
Kernel-level rootkits affect system security by modifying key kernel data structures to achieve a variety of malicious goals. While early rootkits modified control data structur...
Arati Baliga, Vinod Ganapathy, Liviu Iftode
BIBE
2008
IEEE
204views Bioinformatics» more  BIBE 2008»
15 years 8 months ago
2D Oculomotor Plant Mathematical Model for eye movement simulation
-This paper builds a two dimensional Oculomotor Plant Mathematical Model (2DOPMM) that is capable of generating eye movement trace on a two dimensional plane. The key difference be...
Oleg Komogortsev, Ukwatta K. S. Jayarathna
CDC
2008
IEEE
187views Control Systems» more  CDC 2008»
15 years 8 months ago
Controlled random access MAC for network utility maximization in wireless networks
— There has been much recent interest in protocol design for wireless networks based on maximizing a network utility function. A significant advance in recent years is the obser...
Robert J. McCabe, Nikolaos M. Freris, P. R. Kumar
« Prev « First page 1314 / 1506 Last » Next »