Sciweavers

1270 search results - page 240 / 254
» IF Validation Environment Tutorial
Sort
View
COMSWARE
2006
IEEE
13 years 11 months ago
Architecting protocol stack optimizations on mobile devices
Applications using traditional protocol stacks (e.g TCP/IP) from wired networks do not function efficiently in mobile wireless scenarios. This is primarily due to the layered archi...
Vijay T. Raisinghani, Sridhar Iyer
DAWAK
2006
Springer
13 years 11 months ago
A Versioning Management Model for Ontology-Based Data Warehouses
More and more integration systems use ontologies to solve the problem of semantic heterogeneities between autonomous databases. To automate the integration process, a number of the...
Dung Nguyen Xuan, Ladjel Bellatreche, Guy Pierra
DCOSS
2006
Springer
13 years 11 months ago
Lifetime Maximization of Sensor Networks Under Connectivity and k-Coverage Constraints
In this paper, we study the fundamental limits of a wireless sensor network's lifetime under connectivity and k-coverage constraints. We consider a wireless sensor network wit...
Wei Mo, Daji Qiao, Zhengdao Wang
ICCD
1997
IEEE
158views Hardware» more  ICCD 1997»
13 years 11 months ago
Practical Advances in Asynchronous Design
Asynchronous systems are being viewed as an increasingly viable alternative to purely synchronous systems. This paper gives an overview of the current state of the art in practica...
Erik Brunvand, Steven M. Nowick, Kenneth Y. Yun
LISA
2008
13 years 10 months ago
Concord: A Secure Mobile Data Authorization Framework for Regulatory Compliance
With the increasing adoption of mobile computing devices that carry confidential data, organizations need to secure data in an ever-changing environment. Critical organizational d...
Gautam Singaraju, Brent Hoon Kang