Sciweavers

1994 search results - page 169 / 399
» Limited Software Warranties
Sort
View
WISTP
2010
Springer
14 years 5 months ago
A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones
Widespread use and general purpose computing capabilities of next generation smartphones make them the next big targets of malicious software (malware) and security attacks. Given ...
Tansu Alpcan, Christian Bauckhage, Aubrey-Derrick ...
GLOBECOM
2009
IEEE
14 years 5 months ago
Least Squares Estimation for the Digital Compensation of Tx Leakage in zero-IF Receivers
—Transmitter Leakage has a significant impact on the system performance in mobile devices using zero-IF receivers and thus requires a suitable compensation. In contrast to analo...
Andreas Frotzscher, Gerhard Fettweis
ISORC
2007
IEEE
14 years 5 months ago
Data Dissemination for Wireless Sensor Networks
Due to the special characteristics (limited battery power, limited computing capability, low bandwidth, need to collect sensor data from multiple fixed-location source nodes to a...
Min-Gu Lee, Sunggu Lee
SECON
2007
IEEE
14 years 5 months ago
High-Level Application Development is Realistic for Wireless Sensor Networks
—Programming Wireless Sensor Network (WSN) applications is known to be a difficult task. Part of the problem is that the resource limitations of typical WSN nodes force programm...
Marcin Karpinski, Vinny Cahill
EEMMAS
2007
Springer
14 years 4 months ago
Engineering Contextual Information for Pervasive Multiagent Systems
Multiagent systems for mobile and pervasive computing should extensively exploit contextual information both to adapt to user needs and to enable autonomic behavior. This raises th...
Gabriella Castelli, Marco Mamei, Franco Zambonelli