Sciweavers

2612 search results - page 483 / 523
» Mobile Processes and Termination
Sort
View
ECEH
2006
168views Healthcare» more  ECEH 2006»
13 years 10 months ago
Building a Smart Hospital using RFID Technologies
: Technologies of identification by radio frequencies (RFID) experience a fast development and healthcare is predicted to be one of its major growth areas. After briefly introducin...
Patrik Fuhrer, Dominique Guinard
ICAD
2004
13 years 10 months ago
Soundserver: Data Sonification On-Demand for Computational Instances
The rapid accumulation of large collections of data has created the need for efficient and intelligent schemes for knowledge extraction and results analysis. The resulting informa...
Jorge Cardoso, Jos Carvalho, Luís Teixeira,...
DBSEC
2003
149views Database» more  DBSEC 2003»
13 years 10 months ago
Anti-Tamper Databases: Querying Encrypted Databases
With mobile computing and powerful laptops, databases with sensitive data can be physically retrieved by malicious users who can employ techniques that were not previously thought...
Gultekin Özsoyoglu, David A. Singer, Sun S. C...
OPODIS
2004
13 years 10 months ago
Searching for a Black Hole in Tree Networks
A black hole is a highly harmful stationary process residing in a node of a network and destroying all mobile agents visiting the node, without leaving any trace. We consider the t...
Jurek Czyzowicz, Dariusz R. Kowalski, Euripides Ma...
ISCAPDCS
2003
13 years 10 months ago
Performance of a Jini-based Ad Hoc Network Authentication Scheme
Ad hoc networks provide a dynamically reconfigurable network infrastructure where entities can participate at will. Jini technology can be used to implement an ad hoc network, and...
M. M. McMahon, D. M. Needham, J. B. Datko