Sciweavers

255 search results - page 44 / 51
» The Reconstruction of a Mobile Agent Computation and Its Val...
Sort
View
CHI
2010
ACM
15 years 4 months ago
Predicting the cost of error correction in character-based text entry technologies
Researchers have developed many models to predict and understand human performance in text entry. Most of the models are specific to a technology or fail to account for human fact...
Ahmed Sabbir Arif, Wolfgang Stuerzlinger
MOBIWAC
2006
ACM
15 years 3 months ago
Indoor tracking in WLAN location with TOA measurements
Authors presented recently an indoor location technique based on Time Of Arrival (TOA) obtained from Round-Trip-Time (RTT) measurements at data link level and trilateration. This ...
Marc Ciurana, Francisco Barceló, Sebastiano...
IPPS
2005
IEEE
15 years 3 months ago
Fault-Tolerant Parallel Applications with Dynamic Parallel Schedules
Commodity computer clusters are often composed of hundreds of computing nodes. These generally off-the-shelf systems are not designed for high reliability. Node failures therefore...
Sebastian Gerlach, Roger D. Hersch
ATC
2007
Springer
15 years 3 months ago
Identity-Based Proxy Signature from Pairings
A proxy signature scheme allows an entity to delegate its signing capability to another entity (proxy) in such a way that the proxy can sign messages on behalf of the delegator. Pr...
Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xin...
SAC
2005
ACM
15 years 3 months ago
Performance analysis framework for large software-intensive systems with a message passing paradigm
The launch of new features for mobile phones is increasing and the product life cycle symmetrically decreasing in duration as higher levels of sophistication are reached. Therefor...
Christian Del Rosso