Sciweavers

1010 search results - page 183 / 202
» An Access Control Framework for Pervasive Computing Environm...
Sort
View
BMCBI
2010
268views more  BMCBI 2010»
13 years 8 months ago
A high-level 3D visualization API for Java and ImageJ
Background: Current imaging methods such as Magnetic Resonance Imaging (MRI), Confocal microscopy, Electron Microscopy (EM) or Selective Plane Illumination Microscopy (SPIM) yield...
Benjamin Schmid, Johannes E. Schindelin, Albert Ca...
OTM
2007
Springer
14 years 1 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
ICN
2005
Springer
14 years 1 months ago
MiSC: A New Availability Remote Storage System for Mobile Appliance
Abstract. The continued growth of both mobile appliances and wireless Internet technologies is bringing a new telecommunication revolution and has extended the demand of various se...
Joo-Ho Kim, Bo-Seok Moon, Myong-Soon Park
MOBIHOC
2004
ACM
14 years 1 months ago
Multi-channel mac for ad hoc networks: handling multi-channel hidden terminals using a single transceiver
This paper proposes a medium access control (MAC) protocol for ad hoc wireless networks that utilizes multiple channels dynamically to improve performance. The IEEE 802.11 standar...
Jungmin So, Nitin H. Vaidya
SIGUCCS
2004
ACM
14 years 1 months ago
Software's little helpers: managing your lab areas
There are always more labs and other things to attend to than available bodies to watch over said pesky details. How can we keep an eye on the ever-present large and small events ...
Doug Simpson