Sciweavers

1187 search results - page 152 / 238
» A Timed Calculus for Wireless Systems
Sort
View
PERCOM
2007
ACM
16 years 3 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
ITNG
2006
IEEE
15 years 10 months ago
An Automated WSDL Generation and Enhanced SOAP Message Processing System for Mobile Web Services
Web services are key applications in business-to-business, business-to-customer, and enterprise applications integration solutions. As the mobile Internet becomes one of the main ...
Gil Cheol Park, Seoksoo Kim, Gun Tae Bae, Yang Sok...
HICSS
2003
IEEE
200views Biometrics» more  HICSS 2003»
15 years 9 months ago
A Dynamic Assignment Problem in a Mobile System with Limited Bandwidth
The assignment problem originally arising from parallel and distributed computing has been investigated intensively since the 70’s when Harold Stone proposed a method to solve i...
Yang Wang 0006, Thomas Kunz
EJASP
2010
89views more  EJASP 2010»
14 years 11 months ago
Sparsity-Aware Estimation of CDMA System Parameters
The number of active users, their timing offsets, and their (possibly dispersive) channels with the access point are decisive parameters for wireless code division multiple access...
Daniele Angelosante, Emanuele Grossi, Georgios B. ...
JCIT
2010
162views more  JCIT 2010»
14 years 11 months ago
Call Admission Control Strategy for System Throughput Maximization Using DOVE
In this paper we propose a signal-to-interference (SIR)-based distributed Call Admission Control (CAC) strategy that considers the combined effect of both call and packet level qu...
Tanzilah Noor Shabnam, Md. Imdadul Islam, M. R. Am...