Sciweavers

1027 search results - page 46 / 206
» Developing context-aware pervasive computing applications: M...
Sort
View
ICDCS
2011
IEEE
12 years 8 months ago
Localizing Multiple Jamming Attackers in Wireless Networks
Abstract—Jamming attacks and unintentional radio interference are one of the most urgent threats harming the dependability of wireless communication and endangering the successfu...
Hongbo Liu, Zhenhua Liu, Yingying Chen, Wenyuan Xu
LOCA
2009
Springer
14 years 3 months ago
Location Diversity: Enhanced Privacy Protection in Location Based Services
Abstract. Location-based Services are emerging as popular applications in pervasive computing. Spatial k-anonymity is used in Locationbased Services to protect privacy, by hiding t...
Mingqiang Xue, Panos Kalnis, Hung Keng Pung
HCI
2009
13 years 6 months ago
Rapid Development of Scoped User Interfaces
As the demand for domain- and formalism-specific visual modelling environments grows, the need to rapidly construct complex User Interfaces (UIs) increases. In this paper, we propo...
Denis Dubé, Jacob Beard, Hans Vangheluwe
EUROPAR
2005
Springer
14 years 2 months ago
An Approach to Performance Prediction for Parallel Applications
Abstract. Accurately modeling and predicting performance for largescale applications becomes increasingly difficult as system complexity scales dramatically. Analytic predictive mo...
Engin Ipek, Bronis R. de Supinski, Martin Schulz, ...
DEXAW
1995
IEEE
93views Database» more  DEXAW 1995»
14 years 12 days ago
Meta Modeling for End User Computing
Inherent constraints play an important role in the semantic Xplain model. These constraints enable us to represent certain real world knowledge once for subsequent use in several ...
J. H. ter Bekke