Sciweavers

425 search results - page 40 / 85
» The ENTRAPID Protocol Development Environment
Sort
View
143
Voted
FGCS
2008
159views more  FGCS 2008»
15 years 3 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
121
Voted
FGCS
2006
121views more  FGCS 2006»
15 years 3 months ago
Real-time multi-scale brain data acquisition, assembly, and analysis using an end-to-end OptIPuter
At iGrid 2005 we demonstrated the transparent operation of a biology experiment on a test-bed of globally distributed visualization, storage, computational, and network resources....
Rajvikram Singh, Nicholas Schwarz, Nut Taesombut, ...
MOBICOM
2006
ACM
15 years 9 months ago
Collision avoidance in a dense RFID network
In this work, we develop a CSMA-based MAC protocol to avoid reader-reader and reader-tag collisions in a dense RFID network. The network is implemented using mote-based RFID reade...
Shweta Jain, Samir R. Das
120
Voted
GC
2004
Springer
15 years 8 months ago
For-LySa: UML for Authentication Analysis
The DEGAS project aims at enriching standard UML-centred development environments in such a way that the developers of global applications can exploit automated formal analyses wit...
Mikael Buchholtz, Carlo Montangero, Lara Perrone, ...
130
Voted
CAD
2000
Springer
15 years 3 months ago
The Enterprise-Web portal for life-cycle support
As we enter the new millennium, the approach to product development is evolving rapidly. Companies are in the process of creating a distributed design and manufacturing environmen...
Mohsen Rezayat