Sciweavers

3016 search results - page 558 / 604
» Disappearing mobile devices
Sort
View
JCP
2006
120views more  JCP 2006»
13 years 7 months ago
Password-authenticated Key Exchange using Efficient MACs
Abstract-- This paper is concerned with passwordauthenticated key agreement protocols. Designing such protocols represents an interesting challenge since there is no standard way o...
Maurizio Adriano Strangio
JNW
2006
111views more  JNW 2006»
13 years 7 months ago
A Novel AP for Improving the Performance of Wireless LANs Supporting VoIP
Recently, wireless LANs based on the IEEE 802.11 standard have become popular and widely used, and Voice-over-IP (VoIP) is one of the most promising technologies to be used in mobi...
Thavisak Manodham, Tetsuya Miki
ENTCS
2007
115views more  ENTCS 2007»
13 years 7 months ago
Self Management and the Future of Software Design
Most software is fragile: even the slightest error, such as changing a single bit, can make it crash. As software complexity has increased, development techniques have kept pace t...
Peter Van Roy
MAM
2006
95views more  MAM 2006»
13 years 7 months ago
A selective DVS technique based on battery residual
Conventional research on DVS assumes that the battery, which is the power source of most mobile devices, provides constant power; the battery, however, has unique discharge charac...
Sukwon Choi, Hojung Cha, Rhan Ha
AICOM
2005
108views more  AICOM 2005»
13 years 7 months ago
SIADEX: An interactive knowledge-based planner for decision support in forest fire fighting
SIADEX is a complex framework that integrates several AI techniques able to design fighting plans against forest fires. It is based on four main components, a web server, that cent...
Marc de la Asunción, Luis A. Castillo, Juan...