Sciweavers

1283 search results - page 118 / 257
» Atomicity Implementation in Mobile Computing
Sort
View
ACSAC
2002
IEEE
14 years 3 months ago
Throttling Viruses: Restricting propagation to defeat malicious mobile code
Modern computer viruses spread incredibly quickly, far faster than human-mediated responses. This greatly increases the damage that they cause. This paper presents an approach to ...
Matthew M. Williamson
RAS
2002
131views more  RAS 2002»
13 years 9 months ago
Behavior generation for a mobile robot based on the adaptive fitness function
We have to prepare the evaluation (fitness) function to evaluate the performance of the robot when we apply the machine learning techniques to the robot application. In many cases,...
Eiji Uchibe, Masakazu Yanase, Minoru Asada
JUCS
2010
97views more  JUCS 2010»
13 years 8 months ago
Supporting Mobile Users in Selecting Target Devices
: The availability of applications able to exploit multi-device environments is steadily increasing. Rather than using all devices in the same way, users tend to assign different r...
Giuseppe Ghiani, Fabio Paternò
AGENTS
2001
Springer
14 years 2 months ago
Using rat navigation models to learn orientation from visual input on a mobile robot
Rodents possess extraordinary navigation abilities that are far in excess of what current state-of-the-art robot agents are capable of. This paper describes research that is part ...
Brett Browning
EUROSYS
2011
ACM
13 years 1 months ago
CloneCloud: elastic execution between mobile device and cloud
Mobile applications are becoming increasingly ubiquitous and provide ever richer functionality on mobile devices. At the same time, such devices often enjoy strong connectivity wi...
Byung-Gon Chun, Sunghwan Ihm, Petros Maniatis, May...