Sciweavers

192 search results - page 38 / 39
» Configuration of Applications for the 3rd Generation Mobile ...
Sort
View
BXML
2004
13 years 8 months ago
Subject Identification in Topic Maps in Theory and Practice
: If Topic Maps should be exchanged in distributed environments a common semantic problem occurs: Do two Topics refer to the same Subject? If they describe the same Subject the giv...
Lutz Maicher
CF
2004
ACM
14 years 24 days ago
An architectural framework and a middleware for cooperating smart components
In a future networked physical world, a myriad of smart sensors and actuators assess and control aspects of their environments and autonomously act in response to it. Examples ran...
Antonio Casimiro, Jörg Kaiser, Paulo Ver&iacu...
JVCIR
2006
163views more  JVCIR 2006»
13 years 7 months ago
Layered H.264 video transmission with hierarchical QAM
In multimedia communication systems, channel bandwidth and probability of error are the two main limitations that affect the quality of service. Therefore, in applications such as...
Mohammad Mahdi Ghandi, Mohammed Ghanbari
PERCOM
2010
ACM
13 years 11 months ago
Negotiate power and performance in the reality of RFID systems
—Recent years have witnessed the wide adoption of the RFID technology in many important application domains including logistics, inventory, retailing, public transportation, and ...
Xunteng Xu, Lin Gu, Jianping Wang, Guoliang Xing
FSE
2004
Springer
125views Cryptology» more  FSE 2004»
13 years 11 months ago
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms
ded abstract of this paper appears in Fast Software Encryption, FSE 2004, Lecture Notes in Computer Science, W. Meier and B. Roy editors, Springer-Verlag, 2004. This is the full ve...
Tetsu Iwata, Tadayoshi Kohno