Sciweavers

697 search results - page 130 / 140
» Information Rich Glyphs for Software Management Data
Sort
View
MSWIM
2006
ACM
14 years 1 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
EMSOFT
2005
Springer
14 years 1 months ago
Semantics-based optimization across uncoordinated tasks in networked embedded systems
Microservers are networked embedded devices that accept user tasks on demand and execute them on real world information collected by sensors. Sharing intermediate sensing and comp...
Jie Liu, Elaine Cheong, Feng Zhao
IADIS
2004
13 years 9 months ago
Constructing digital libraries with quality
Digital Libraries can be considered islands of specialized collections on the Web, which have their own management policy to control publishing and access, offering an environment...
Ewerton M. Salvador, José Jorge L. D. Jr., ...
JAL
2008
89views more  JAL 2008»
13 years 7 months ago
Experimenting with parallelism for the instantiation of ASP programs
Abstract. In the last few years, the microprocessors technologies have been definitely moving to multi-core architectures, in order to improve performances as well as reduce power ...
Francesco Calimeri, Simona Perri, Francesco Ricca
REALWSN
2010
13 years 5 months ago
Location Based Wireless Sensor Services in Life Science Automation
Over the last years Wireless Sensor Networks (WSN) have been becoming increasingly applicable for real world scenarios and now production ready solutions are available. In the same...
Benjamin Wagner, Philipp Gorski, Frank Golatowski,...