Sciweavers

231 search results - page 11 / 47
» Data naming in Vehicle-to-Vehicle communications
Sort
View
INFOCOM
2007
IEEE
14 years 2 months ago
On the Stability-Scalability Tradeoff of DHT Deployment
— Distributed hash tables (DHTs) provide efficient data naming and location with simple hash-table-like primitives, upon which sophisticated distributed applications can be buil...
Chih-Chiang Wang, Khaled Harfoush
TITB
2011
113views more  TITB 2011»
13 years 2 months ago
Intensive Care Window: Real-Time Monitoring and Analysis in the Intensive Care Environment
—This paper introduces a novel, open source software named Intensive Care Window, ICW. ICW enables communication with intensive care unit bedside installed medical devices over s...
Nikolas Stylianides, Marios D. Dikaiakos, K. Haral...
INTERACT
2003
13 years 9 months ago
Proximal Interactions: A Direct Manipulation Technique for Wireless Networking
As a number of networked digital devices are ubiquitously used, control of inter-device communications becomes a complicated task. People can no longer keep track of all the device...
Jun Rekimoto, Yuji Ayatsuka, Michimune Kohno, Haru...
POPL
2004
ACM
14 years 8 months ago
Asynchronous and deterministic objects
We present in this article a precise security model for data confidentiality in the framework of asynchronous and deterministic objects. Our underlying programming model is based ...
Denis Caromel, Ludovic Henrio, Bernard P. Serpette
GLOBECOM
2007
IEEE
13 years 11 months ago
Scaling Laws for Delay Sensitive Traffic in Rayleigh Fading Networks
The throughput of delay sensitive traffic in a Rayleigh fading network is studied by adopting a scaling limit approach. The case of study is that of a pair of nodes establishing a ...
Nikhil Karamchandani, Massimo Franceschetti