Sciweavers

8468 search results - page 1599 / 1694
» The Technology of Data Stashing
Sort
View
CSE
2009
IEEE
15 years 4 months ago
Using Discovery and Monitoring Services to Support Context-Aware Remote Assisted Living Applications
Ubiquitous and pervasive applications are aware of the context of the used resources. This class of application can benefit from mechanisms to discover resources (devices and sens...
André Luiz B. Rodrigues, Izabela C. Gomes, ...
DATE
2009
IEEE
148views Hardware» more  DATE 2009»
15 years 4 months ago
A new design-for-test technique for SRAM core-cell stability faults
—Core-cell stability represents the ability of the core-cell to keep the stored data. With the rapid development of semiconductor memories, their test is becoming a major concern...
Alexandre Ney, Luigi Dilillo, Patrick Girard, Serg...
WCRE
2009
IEEE
15 years 4 months ago
Enabling the Evolution of J2EE Applications through Reverse Engineering and Quality Assurance
Abstract—Enterprise Applications are complex software systems that manipulate much persistent data and interact with the user through a vast and complex user interface. In partic...
Fabrizio Perin
ISCC
2009
IEEE
159views Communications» more  ISCC 2009»
15 years 4 months ago
Synchronous ultra-wide band wireless sensors networks for oil and gas exploration
Abstract— The fluctuations of the price of crude oil is pushing the oil companies to increase the investments in seismic exploration of new oil and gas reservoir. Seismic explor...
Stefano Savazzi, Umberto Spagnolini
RTAS
2009
IEEE
15 years 4 months ago
Real-Time Video Surveillance over IEEE 802.11 Mesh Networks
In recent years, there has been an increase in video surveillance systems in public and private environments due to a heightened sense of security. The next generation of surveill...
Arvind Kandhalu, Anthony Rowe, Ragunathan Rajkumar...
« Prev « First page 1599 / 1694 Last » Next »