Sciweavers

1283 search results - page 86 / 257
» Atomicity Implementation in Mobile Computing
Sort
View
ICAC
2005
IEEE
14 years 2 months ago
Self-Configuring and Optimizing Mobile Ad Hoc Networks
We present the design and implementation of a working system that enables self-configuration and self-optimization in mobile ad hoc networks (MANETs) by exploiting context awarene...
Apostolos Malatras, George Pavlou, Stylianos Gouve...
CONEXT
2007
ACM
14 years 26 days ago
Experimenting with real-life opportunistic communications using windows mobile devices
Pocket Switched Networks (PSN) is a novel communication paradigm which aims to exploit the opportunistic contacts between mobile devices to exchange data over multiple hops. A key...
Anna Kaisa Pietiläinen, Christophe Diot
IPPS
2006
IEEE
14 years 2 months ago
Exploiting dynamic proxies in middleware for distributed, parallel, and mobile Java applications
Babylon v2.0 is a collection of tools and services that provide a 100% Java compatible environment for developing, running and managing parallel, distributed and mobile Java appli...
Willem van Heiningen, Tim Brecht, Steve MacDonald
ICRA
2008
IEEE
138views Robotics» more  ICRA 2008»
14 years 3 months ago
Embedded auditory system for small mobile robots
— Auditory capabilities would allow small robots interacting with people to act according to vocal cues. In our recent work, we have demonstrated AUDIBLE, an auditory system capa...
Simon Brière, Jean-Marc Valin, Franç...
CORR
2008
Springer
179views Education» more  CORR 2008»
13 years 9 months ago
Induction and Co-induction in Sequent Calculus
Abstract. Proof search has been used to specify a wide range of computation systems. In order to build a framework for reasoning about such specifications, we make use of a sequent...
Alwen Tiu, Alberto Momigliano