Sciweavers

5184 search results - page 976 / 1037
» Computer support for mechatronic control system design
Sort
View
WISEC
2010
ACM
13 years 9 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
EGITALY
2006
13 years 10 months ago
Easy Access to Huge 3D Models of Works of Art
Automatic shape acquisition technologies evolved rapidly in recent years, and huge mass of 3D data can be easily produced. The high accuracy of range scanning technology makes the...
Marco Callieri, Federico Ponchio, Paolo Cignoni, R...
SIGCOMM
2010
ACM
13 years 9 months ago
LokVaani: demonstrating interactive voice in Lo3
In this work, we consider the goal of enabling effective voice communication in a TDMA, multi-hop mesh network, using low cost and low power platforms. We consider two primary usa...
Vijay Gabale, Bhaskaran Raman, Kameswari Chebrolu,...
ICDCS
2009
IEEE
14 years 6 months ago
Q-Tree: A Multi-Attribute Based Range Query Solution for Tele-immersive Framework
Users and administrators of large distributed systems are frequently in need of monitoring and management of its various components, data items and resources. Though there exist s...
Md. Ahsan Arefin, Md. Yusuf Sarwar Uddin, Indranil...
EUROSYS
2009
ACM
14 years 25 days ago
Effective and efficient compromise recovery for weakly consistent replication
Weakly consistent replication of data has become increasingly important both for loosely-coupled collections of personal devices and for large-scale infrastructure services. Unfor...
Prince Mahajan, Ramakrishna Kotla, Catherine C. Ma...