Sciweavers

1513 search results - page 119 / 303
» Evaluation of User-Interfaces for Mobile Application Develop...
Sort
View
ACMDIS
2004
ACM
14 years 2 months ago
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
Privacy is a difficult design issue that is becoming increasingly important as we push into ubiquitous computing environments. While there is a fair amount of theoretical work on ...
Jason I. Hong, Jennifer D. Ng, Scott Lederer, Jame...
DEXAW
2006
IEEE
129views Database» more  DEXAW 2006»
14 years 3 months ago
Interaction Styles for Service Discovery in Mobile Business Applications
As the power of mobile devices continues to grow, and the range of resources accessible via wireless networks expands, there is an increasing need to offer services to users in a ...
Markus Aleksy, Colin Atkinson, Philipp Bostan, Tho...
NETWORKING
2008
13 years 10 months ago
An Overlay Architecture for Vehicular Networks
We propose and discuss an overlay architecture relying on a mobile ad hoc network, called Arigatoni on wheels (Ariwheels for short). More specifically, Ariwheels is a virtual netwo...
Luigi Liquori, Diego Borsetti, Claudio Casetti, Ca...
CGVR
2006
13 years 10 months ago
Application Of Virtual Reality Technology To Evacuation Simulation In Fire Disaster
- The correct and quick evacuation of occupants is very important for the save of lives in a public building when it is attacked by a fire. However, it is difficult to train the oc...
Aizhu Ren, Chi Chen, Jianyong Shi, Liang Zou
MSS
2005
IEEE
182views Hardware» more  MSS 2005»
14 years 2 months ago
Evaluation of Advanced TCP Stacks in the iSCSI Environment using Simulation Model
Enterprise storage demands have overwhelmed traditional storage mechanisms and have led to the development of Storage Area Networks (SANs). This has resulted in the design of SCSI...
Girish Motwani, K. Gopinath