Sciweavers

321 search results - page 54 / 65
» Decoupling of Computation and Communication with a Communica...
Sort
View
TSE
2010
230views more  TSE 2010»
13 years 2 months ago
Vulnerability Discovery with Attack Injection
The increasing reliance put on networked computer systems demands higher levels of dependability. This is even more relevant as new threats and forms of attack are constantly being...
João Antunes, Nuno Ferreira Neves, Miguel C...
CGI
2000
IEEE
14 years 5 days ago
To Gesture or Not to Gesture: What is the Question?
Computer synthesized characters are expected to make appropriate face, limb, and body gestures during communicative acts. We focus on non-facial movements and try to elucidate wha...
Norman I. Badler, Monica Costa, Liwei Zhao, Diane ...
MDM
2010
Springer
151views Communications» more  MDM 2010»
13 years 6 months ago
diffeRS: A Mobile Recommender Service
—Thanks to advances in mobile technology, modern mobile devices have become essential companions, assisting their users in attaining their daily tasks. It will not be long before...
Lucia Del Prete, Licia Capra
SAC
2004
ACM
14 years 1 months ago
A declarative framework for adaptable applications in heterogeneous environments
In this paper we present an approach for developing adaptable software applications. The problem we are facing is that of a (possibly mobile) user who wants to download and execut...
Paola Inverardi, Fabio Mancinelli, Monica Nesi
MOBISYS
2010
ACM
13 years 10 months ago
NAPman: network-assisted power management for wifi devices
WiFi radios in smart-phones consume a significant amount of power when active. The 802.11 standard allows these devices to save power through an energy-conserving Power Save Mode ...
Eric Rozner, Vishnu Navda, Ramachandran Ramjee, Sh...