Sciweavers

1092 search results - page 34 / 219
» Located Operators
Sort
View
INFOCOM
2010
IEEE
13 years 7 months ago
Efficient Continuous Scanning in RFID Systems
RFID is an emerging technology with many potential applications such as inventory management for supply chain. In practice, these applications often need a series of continuous sca...
Bo Sheng, Qun Li, Weizhen Mao
SAC
2009
ACM
14 years 2 months ago
Autonomous networked robots for the establishment of wireless communication in uncertain emergency response scenarios
During a disaster, emergency response operations can benefit from the establishment of a wireless ad hoc network. We propose the use of autonomous robots that move inside a disas...
Stelios Timotheou, Georgios Loukas
HOTOS
2003
IEEE
14 years 3 months ago
Access Control to Information in Pervasive Computing Environments
Many types of information available in a pervasive computing environment, such as people location information, should be accessible only by a limited set of people. Some propertie...
Urs Hengartner, Peter Steenkiste
WWW
2001
ACM
14 years 10 months ago
Querying XML data: the DQL language
This poster describes the DQL language : a new XML data manipulation language. DQL is an extension of OQL for the manipulation of tree-like and forest-like data. It integrates XPa...
Emmanuel Bruno, Jacques Le Maitre, Elisabeth Muris...
ASAP
2008
IEEE
93views Hardware» more  ASAP 2008»
14 years 4 months ago
Memory copies in multi-level memory systems
Data movement operations, such as the C-style memcpy function, are often used to duplicate or communicate data. This type of function typically produces a significant amount of o...
Pepijn J. de Langen, Ben H. H. Juurlink