Sciweavers

829 search results - page 120 / 166
» Customizable Pervasive Applications
Sort
View
JNW
2007
132views more  JNW 2007»
13 years 9 months ago
Genetic Algorithm for Hierarchical Wireless Sensor Networks
— Large scale wireless sensor networks (WSNs) can be used for various pervasive and ubiquitous applications such as security, health-care, industry automation, agriculture, envir...
Sajid Hussain, Abdul Wasey Matin, Obidul Islam
IEEECIT
2010
IEEE
13 years 8 months ago
Virtual Security Kernel: A Component-Based OS Architecture for Self-Protection
—This paper presents VSK, a lightweight adaptable OS authorization architecture suitable for self-protection of pervasive devices. A “virtual” management plane, separate from...
Ruan He, Marc Lacoste, Jean Leneutre
PERCOM
2010
ACM
13 years 8 months ago
UpperWare: Bringing resources back to the system
If we expect the computer to vanish in the background, to make pervasive computing a reality, first we must be able to provide the illusion that all the user’s computers, devic...
Francisco J. Ballesteros, Gorka Guardiola, Enrique...
ACL
2010
13 years 7 months ago
Beyond NomBank: A Study of Implicit Arguments for Nominal Predicates
Despite its substantial coverage, NomBank does not account for all withinsentence arguments and ignores extrasentential arguments altogether. These arguments, which we call implic...
Matthew Gerber, Joyce Yue Chai
TRIDENTCOM
2010
IEEE
13 years 7 months ago
Open Urban Computing Testbed
We present a unique urban computing testbed for studying the utilization of ubiquitous computing technology in the public urban space of a city center. The testbed comprises of a w...
Timo Ojala, Hannu Kukka, Tommi Heikkinen, Tomas Li...