Sciweavers

823 search results - page 101 / 165
» Distributed Cipher Services Using Object Activation
Sort
View
WSC
1997
13 years 9 months ago
Business Process Modeling with SIMPROCESS
This paper gives an overview of business process modeling with SIMPROCESS, its applications, unique features, basic and advanced modeling constructs, and benefits. 1 WHAT IS SIMPR...
Scott Swegles
WSTFEUS
2003
IEEE
14 years 1 months ago
DOLPHIN: An Autonomous Indoor Positioning System in Ubiquitous Computing Environment
Determining physical location of indoor objects is one of the key issues in development of context-aware applications in ubiquitous computing environment. This is mainly because c...
Yasuhiro Fukuju, Masateru Minami, Hiroyuki Morikaw...
ICCSA
2005
Springer
14 years 1 months ago
Reflective Middleware for Location-Aware Application Adaptation
Today mobile computing is pervasively taking over the traditional desktop computing. Mobile devices are characterized by abrupt and unannounced changes in execution context. The ap...
Uzair Ahmad, S. Y. Lee, Mahrin Iqbal, Uzma Nasir, ...
CORR
2012
Springer
237views Education» more  CORR 2012»
12 years 3 months ago
Novel Component Based Development Model For Sip-Based Mobile Application
Universities and Institutions these days’ deals with issues related to with assessment of large number of students. Various evaluation methods have been adopted by examiners in ...
Ahmed Barnawi, Abdurrahman H. Al-Talhi, M. Rizwan ...
TPDS
2008
105views more  TPDS 2008»
13 years 8 months ago
peerTalk: A Peer-to-Peer Multiparty Voice-over-IP System
Multiparty voice-over-IP (MVoIP) services allow a group of people to freely communicate with each other via the Internet, which have many important applications such as online gami...
Xiaohui Gu, Zhen Wen, Philip S. Yu, Zon-Yin Shae