Sciweavers

785 search results - page 117 / 157
» An Evaluation Mechanism for QoS Management in Wireless Syste...
Sort
View
ICCAD
2003
IEEE
152views Hardware» more  ICCAD 2003»
14 years 5 months ago
Dynamic Fault-Tolerance and Metrics for Battery Powered, Failure-Prone Systems
Emerging VLSI technologies and platforms are giving rise to systems with inherently high potential for runtime failure. Such failures range from intermittent electrical and mechan...
Phillip Stanley-Marbell, Diana Marculescu
MOBILITY
2009
ACM
14 years 1 months ago
Context adaptative systems based on horizontal architecture for ubiquitous computing
Many adaptative context-aware middleware exist and mostly rely on so-called vertical architectures that offer a functional decomposition for context-awareness. This architecture ...
Nicolas Ferry, Stephane Lavirotte, Jean-Yves Tigli...
VTC
2010
IEEE
201views Communications» more  VTC 2010»
13 years 7 months ago
iTETRIS: Adaptation of ITS Technologies for Large Scale Integrated Simulation
1 —the European Union (EU) Framework Program 7 (FP7) funded project, iTETRIS [1] (An Integrated Wireless and Traffic Platform for Real-Time Road Traffic Management Solutions) tar...
Vineet Kumar, Lan Lin, Daniel Krajzewicz, Fatma Hr...
GIS
2008
ACM
13 years 10 months ago
Towards a scalable model for location privacy
With the growth of wireless and mobile technologies, we are witnessing an increase in location-based services (LBS). Although LBS provide enhanced functionalities, they open up ne...
Nayot Poolsappasit, Indrakshi Ray
SECURWARE
2008
IEEE
14 years 3 months ago
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data
—A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper descri...
Ángel Cuevas, Paul El Khoury, Laurent Gomez...