Sciweavers

1805 search results - page 313 / 361
» Understanding Code Mobility
Sort
View
CORR
2006
Springer
52views Education» more  CORR 2006»
14 years 11 months ago
A SIMO Fiber Aided Wireless Network Architecture
Abstract-- The concept of a fiber aided wireless network architecture (FAWNA) is introduced in [Ray et al., Allerton Conference 2005], which allows high-speed mobile connectivity b...
Siddharth Ray, Muriel Médard, Lizhong Zheng
IJNSEC
2008
150views more  IJNSEC 2008»
14 years 11 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald
IJSWIS
2008
126views more  IJSWIS 2008»
14 years 11 months ago
Bringing Semantic Services to Real-World Objects
The last few years have seen the emergence of two parallel trends: the first of such trends is set by technologies such as Near Field Communication, 2D Bar codes and RFID that supp...
Massimo Paolucci, Gregor Broll, John Hamard, Enric...
JCM
2008
73views more  JCM 2008»
14 years 11 months ago
Man-Made Noise Evaluation for Cryogenic Receiver Front-End
Abstract--This paper presents measured results of manmade noise impact on an cryogenic receiver front-end (CRFE) in urban and suburban areas in the 2-GHz band with amplitude probab...
Shoichi Narahashi, Kei Satoh, Yasunori Suzuki, Tet...
CORR
2007
Springer
156views Education» more  CORR 2007»
14 years 11 months ago
Analysis of a Mixed Strategy for Multiple Relay Networks
Abstract— Infrastructure based wireless communications systems as well as ad hoc networks experience a growing importance in present-day telecommunications. An increased density ...
Peter Rost, Gerhard Fettweis