Sciweavers

5446 search results - page 1070 / 1090
» Mobile computing
Sort
View
CCS
2009
ACM
14 years 3 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...
IPSN
2009
Springer
14 years 3 months ago
Distributed resource management and matching in sensor networks
We consider a scenario in which there are resources at or near nodes of a network, which are either static (e.g. fire stations, parking spots) or mobile (e.g. police cars). Over ...
Jie Gao, Leonidas J. Guibas, Nikola Milosavljevic,...
IROS
2009
IEEE
150views Robotics» more  IROS 2009»
14 years 3 months ago
AWE: A robotic wall and reconfigurable desk supporting working life in a digital society
—“AWE” is a programmable “Animated Work Environment” supporting everyday human activities, at home, work and school, in an increasingly digital society. AWE features a no...
Keith Evan Green, Ian D. Walker, Leo J. Gugerty, J...
LOCA
2009
Springer
14 years 3 months ago
LOCK: A Highly Accurate, Easy-to-Use Location-Based Access Control System
With proliferation of ubiquitous computing, digital access is facing an increasing risk since unauthorized client located at any place may intrude a local server. Location Based Ac...
Yongcai Wang, Junhui Zhao, Toshikazu Fukushima
IWCMC
2009
ACM
14 years 3 months ago
Effect of feedback prediction on OFDMA system throughput
In wireless communication systems, adaptive modulation and coding (AMC) is used to improve the downlink (DL) spectral efficiency by exploiting the underlying channel condition. Ho...
Mohammad Abdul Awal, Lila Boukhatem
« Prev « First page 1070 / 1090 Last » Next »