Sciweavers

6662 search results - page 1315 / 1333
» Mobile and Ubiquitous Computing
Sort
View
STORAGESS
2005
ACM
14 years 1 months ago
Expecting the unexpected: adaptation for predictive energy conservation
The use of access predictors to improve storage device performance has been investigated for both improving access times, as well as a means of reducing energy consumed by the dis...
Jeffrey P. Rybczynski, Darrell D. E. Long, Ahmed A...
AMIRE
2005
Springer
198views Robotics» more  AMIRE 2005»
14 years 1 months ago
Extending the Temporal Horizon of Autonomous Robots
Abstract. We introduce mathematically rigorous metrics on agent experiences having various temporal horizons. Sensorimotor variables accessible to the agent are treated as informat...
Chrystopher L. Nehaniv, Naeem Assif Mirza, Kerstin...
CISC
2005
Springer
169views Cryptology» more  CISC 2005»
14 years 1 months ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay
EURONGI
2005
Springer
14 years 1 months ago
Receiver Oriented Trajectory Based Forwarding
Abstract— Trajectory Based Forwarding (TBF) is a new approach to routing in ad hoc wireless networks. It exploits node position information and, similarly to source routing, requ...
Antonio Capone, Ilario Filippini, Luigi Fratta, Lu...
INTETAIN
2005
Springer
14 years 1 months ago
COMPASS2008: The Smart Dining Service
The Compass20083 project is a sino-german cooperation, aiming at integrating advanced information technologies to create a hightech information system that helps visitors to access...
Ilhan Aslan, Feiyu Xu, Jörg Steffen, Hans Usz...
« Prev « First page 1315 / 1333 Last » Next »