Sciweavers

6662 search results - page 1150 / 1333
» Mobile and Ubiquitous Computing
Sort
View
MOBISYS
2007
ACM
16 years 4 months ago
Experiences of designing and deploying intelligent sensor nodes to monitor hand-arm vibrations in the field
The NEMO project is exploring the use of mobile sensor nodes to augment physical work artefacts in order to ensure compliance with health and safety regulations. In this paper we ...
Christos Efstratiou, Nigel Davies, Gerd Kortuem, J...
MOBISYS
2006
ACM
16 years 4 months ago
Context-aware interactive content adaptation
Automatic adaptation of content for mobile devices is a challenging problem because optimal adaptation often depends on the usage semantics of content, as well as the context of u...
Iqbal Mohomed, Jim Chengming Cai, Sina Chavoshi, E...
MOBIHOC
2007
ACM
16 years 4 months ago
Surviving attacks on disruption-tolerant networks without authentication
Disruption-Tolerant Networks (DTNs) deliver data in network environments composed of intermittently connected nodes. Just as in traditional networks, malicious nodes within a DTN ...
John Burgess, George Dean Bissias, Mark D. Corner,...
EUROSYS
2007
ACM
16 years 1 months ago
Concierge: a service platform for resource-constrained devices
As mobile and embedded devices become widespread, the management and configuration of the software in the devices is increasingly turning into a critical issue. OSGi is a busines...
Jan S. Rellermeyer, Gustavo Alonso
SOSP
2003
ACM
16 years 1 months ago
Model-carrying code: a practical approach for safe execution of untrusted applications
This paper presents a new approach called model-carrying code (MCC) for safe execution of untrusted code. At the heart of MCC is the idea that untrusted code comes equipped with a...
R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sande...
« Prev « First page 1150 / 1333 Last » Next »