Sciweavers

425 search results - page 40 / 85
» The ENTRAPID Protocol Development Environment
Sort
View
111
Voted
FGCS
2008
159views more  FGCS 2008»
15 years 16 days ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
FGCS
2006
121views more  FGCS 2006»
15 years 15 days ago
Real-time multi-scale brain data acquisition, assembly, and analysis using an end-to-end OptIPuter
At iGrid 2005 we demonstrated the transparent operation of a biology experiment on a test-bed of globally distributed visualization, storage, computational, and network resources....
Rajvikram Singh, Nicholas Schwarz, Nut Taesombut, ...
109
Voted
MOBICOM
2006
ACM
15 years 6 months ago
Collision avoidance in a dense RFID network
In this work, we develop a CSMA-based MAC protocol to avoid reader-reader and reader-tag collisions in a dense RFID network. The network is implemented using mote-based RFID reade...
Shweta Jain, Samir R. Das
90
Voted
GC
2004
Springer
15 years 5 months ago
For-LySa: UML for Authentication Analysis
The DEGAS project aims at enriching standard UML-centred development environments in such a way that the developers of global applications can exploit automated formal analyses wit...
Mikael Buchholtz, Carlo Montangero, Lara Perrone, ...
103
Voted
CAD
2000
Springer
15 years 9 days ago
The Enterprise-Web portal for life-cycle support
As we enter the new millennium, the approach to product development is evolving rapidly. Companies are in the process of creating a distributed design and manufacturing environmen...
Mohsen Rezayat