Sciweavers

17082 search results - page 62 / 3417
» Abstractions for Mobile Computation
Sort
View
142
Voted
UIC
2007
Springer
15 years 9 months ago
Mesh-Based Sensor Relocation for Coverage Maintenance in Mobile Sensor Networks
Abstract. Sensor relocation protocols can be employed as fault tolerance approach to offset the coverage loss caused by node failures. We introduce a novel localized structure, in...
Xu Li, Nicola Santoro, Ivan Stojmenovic
131
Voted
AINTEC
2006
Springer
15 years 7 months ago
Proactive Resilience to Dropping Nodes in Mobile Ad Hoc Networks
Abstract. Proactive routing protocols for mobile ad hoc networks currently offer few mechanisms to detect and/or counter malevolent nodes. Stability and performance of most, if not...
Ignacy Gawedzki, Khaldoun Al Agha
141
Voted
EUROSSC
2008
Springer
15 years 5 months ago
Synthesizing Context for a Sports Domain on a Mobile Device
Abstract. In ubiquitous computing environments there are an increasing number and variety of devices that can generate context data. The challenge is to timely acquire, process, an...
Alisa Devlic, Michal Koziuk, Wybe Horsman
134
Voted
UIC
2009
Springer
15 years 10 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
135
Voted
RP
2009
Springer
136views Control Systems» more  RP 2009»
15 years 8 months ago
Abstract Counterexamples for Non-disjunctive Abstractions
Counterexamples for Non-disjunctive ions K. L. McMillan1 and L. D. Zuck2 1 Cadence Research Labs 2 University of Illinois at Chicago Counterexample-guided abstraction refinement (...
Kenneth L. McMillan, Lenore D. Zuck