Sciweavers

2503 search results - page 439 / 501
» Building Computer Network Attacks
Sort
View
ICPPW
2006
IEEE
14 years 4 months ago
A Toolkit-Based Approach to Indoor Localization
Location is one of the most important contexts used in the applications in the pervasive computing environments . It helps the application do the right thing at the right place. O...
Yu Wang, Adam Harder
MIDDLEWARE
2005
Springer
14 years 3 months ago
Context aware sensornet
Advances in MEMS technology, wireless communications, and digital electronics have enabled the development of low-cost, low-power, multifunctional sensor nodes that integrating th...
Huaifeng Qin, Xingshe Zhou
GROUP
2003
ACM
14 years 3 months ago
Supporting activity-centric collaboration through peer-to-peer shared objects
We describe a new collaborative technology that is mid-way between the informality of email and the formality of shared workspaces. Email and other ad hoc collaboration systems ar...
Werner Geyer, Jürgen Vogel, Li-Te Cheng, Mich...
IPPS
1999
IEEE
14 years 2 months ago
Implementation of a Virtual Time Synchronizer for Distributed Databases
The availability of high speed networks and improved microprocessor performance have made it possible to build inexpensive cluster of workstations as an appealing platform for par...
Azzedine Boukerche, Sajal K. Das, Ajoy Kumar Datta...
C5
2004
IEEE
14 years 1 months ago
Enabling Social Dimensions of Learning through a Persistent, Unified, Massively Multi-User, and Self-Organizing Virtual Environm
Existing online learning experiences lack the social dimension that characterizes learning in the real world. This social dimension extends beyond the traditional classroom into t...
Julian Lombardi, Mark P. McCahill