Sciweavers

978 search results - page 62 / 196
» Developing a Common Operating Environment for Military Appli...
Sort
View
FC
2005
Springer
119views Cryptology» more  FC 2005»
15 years 9 months ago
Policy-Based Cryptography and Applications
In this paper, we formulate the concept of policy-based cryptography which makes it possible to perform policy enforcement in large-scale open environments like the Internet, with ...
Walid Bagga, Refik Molva
124
Voted
ISCAS
2007
IEEE
179views Hardware» more  ISCAS 2007»
15 years 10 months ago
A Batteryless Vibration-based Energy Harvesting System for Ultra Low Power Ubiquitous Applications
—In this paper, we propose a vibration driven energy harvesting platform based on piezoelectric material. A new maximum power point tracking (MPPT) method for this platform is al...
Lu Chao, Chi-Ying Tsui, Wing-Hung Ki
141
Voted
CSREAESA
2009
15 years 5 months ago
Application of Embedded Systems in Low Earth Orbit for Measurement of Ionospheric Anomalies
: Space is a hazardous environment for both man and machine and to explore such a terrain a rugged, yet easily implementable, platform is needed. Low-cost, low-power embedded syste...
George J. Starr, J. M. Wersinger, Richard Chapman,...
EUROSYS
2007
ACM
16 years 1 months ago
Adaptive control of virtualized resources in utility computing environments
Data centers are often under-utilized due to over-provisioning as well as time-varying resource demands of typical enterprise applications. One approach to increase resource utili...
Pradeep Padala, Kang G. Shin, Xiaoyun Zhu, Mustafa...
CN
2008
192views more  CN 2008»
15 years 4 months ago
Research on multicast routing protocols for mobile ad-hoc networks
A mobile ad-hoc network (MANET) is composed of mobile nodes without any infrastructure. Mobile nodes self-organize to form a network over radio links. The goal of MANETs is to ext...
Junhai Luo, Xue Liu, Danxia Ye