Sciweavers

1610 search results - page 132 / 322
» A Transaction Model for Mobile Computing
Sort
View
117
Voted
IFIP13
2004
15 years 4 months ago
Designing Distributed Task Performance in Safety-Critical Systems Equipped With Mobile Devices
: This paper describes a method aiming to support the design of interactive-safety critical systems. The method proposes an original integration of approaches usually considered se...
Ana-Maria Marhan, Fabio Paternò, Carmen San...
106
Voted
WCNC
2008
IEEE
15 years 9 months ago
Simulation of Doubly-Selective Compound K Fading Channels for Mobile-to-Mobile Communications
A computer simulation model is proposed for discretetime doubly-selective compound-K fading channel. It first generates multiple independent mobile-to-mobile Rayleigh fading Chan...
Yuan Liu, Jian Zhang, Yahong Rosa Zheng
111
Voted
CSCWD
2005
Springer
15 years 4 months ago
Process mining in CSCW systems
Process mining techniques allow for extracting information from event logs. For example, the audit trails of a workflow management system or the transaction logs of an enterprise ...
Wil M. P. van der Aalst
MIDDLEWARE
2005
Springer
15 years 8 months ago
Functional and architectural adaptation in pervasive computing environments
Service-oriented computing paradigm encourages the use of dynamic binding of application requirements to the resources needed to fulfill application tasks. Especially in pervasive...
Nanjangud C. Narendra, Umesh Bellur, S. K. Nandy, ...
140
Voted
AINA
2006
IEEE
15 years 6 months ago
ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks
Due to the nature of radio transmissions, communications in wireless networks are easy to capture and analyze. Next to this, privacy enhancing techniques (PETs) proposed for wired...
Stefaan Seys, Bart Preneel