Sciweavers

494 search results - page 31 / 99
» A tool suite to prototype pervasive computing applications
Sort
View
SAC
2004
ACM
14 years 28 days ago
WebUml: reverse engineering of web applications
Web applications have become complex and crucial for many firms, especially when combined with areas such as CRM (Customer Relationship Management) and BPR (Business Process Reen...
Carlo Bellettini, Alessandro Marchetto, Andrea Tre...
SAMT
2007
Springer
251views Multimedia» more  SAMT 2007»
14 years 1 months ago
Event Detection in Pedestrian Detection and Tracking Applications
Abstract. In this paper, we present a system framework for event detection in pedestrian and tracking applications. The system is built upon a robust computer vision approach to de...
Philip Kelly, Noel E. O'Connor, Alan F. Smeaton
MOBICOM
1997
ACM
13 years 11 months ago
Dynamic Network Reconfiguration Support for Mobile Computers
Hot swapping technology combined with pervasive heterogeneous networks empowers mobile laptop users to select the best network device for their current environment. Unfortunately,...
Jon Inouye, Jim Binkley, Jonathan Walpole
CISIS
2007
IEEE
14 years 1 months ago
Obtaining Performance Measures through Microbenchmarking in a Peer-to-Peer Overlay Computer
: The availability of enormous amounts of un-used computing power and data storage over the In-ternet makes the development of a globally distributed computing platform, called Ove...
Paolo Bertasi, Mauro Bianco, Andrea Pietracaprina,...
CORR
2010
Springer
106views Education» more  CORR 2010»
13 years 6 months ago
Simulation of Computer Network Attacks
In this work we present a prototype for simulating computer network attacks. Our objective is to simulate large networks (thousands of hosts, with applications and vulnerabilities)...
Carlos Sarraute, Fernando Miranda, José Ign...