Sciweavers

879 search results - page 75 / 176
» Designing Closer to the Edge
Sort
View
HICSS
2003
IEEE
193views Biometrics» more  HICSS 2003»
14 years 3 months ago
Ambient computing applications: an experience with the SPREAD approach
Todays, we assist to the explosive development of mobile computing devices like PDAs and cell-phones, the integration of embedded intelligence (like Web server) in more and more c...
Paul Couderc, Michel Banâtre
CONEXT
2005
ACM
14 years 17 hour ago
MRS: a simple cross-layer heuristic to improve throughput capacity in wireless mesh networks
Wireless Mesh Networks (WMNs) are an emerging architecture based on multi-hop transmission. ISPs considers WMNs as a potential future technology to offer broadband Internet acces...
Luigi Iannone, Serge Fdida
ISAAC
2007
Springer
120views Algorithms» more  ISAAC 2007»
14 years 4 months ago
Succinct Representation of Labeled Graphs
Abstract. We consider the problem of designing succinct representations of labeled graphs (we consider vertex labeled planar triangulations, as well as edge labeled planar graphs a...
Jérémy Barbay, Luca Castelli Aleardi...
UIST
2006
ACM
14 years 4 months ago
In-stroke word completion
We present the design and implementation of a word-level stroking system called Fisch, which is intended to improve the speed of character-level unistrokes. Importantly, Fisch doe...
Jacob O. Wobbrock, Brad A. Myers, Duen Horng Chau
INFOCOM
2002
IEEE
14 years 3 months ago
Restoration Algorithms for Virtual Private Networks in the Hose Model
—A Virtual Private Network (VPN) aims to emulate the services provided by a private network over the shared Internet. The endpoints of e connected using abstractions such as Virt...
Giuseppe F. Italiano, Rajeev Rastogi, Bülent ...