Sciweavers

545 search results - page 82 / 109
» On the design of a pervasive debugger
Sort
View
CACM
2010
90views more  CACM 2010»
13 years 8 months ago
The Singularity system
Every operating system embodies a collection of design decisions. Many of the decisions behind systems have remained unchanged, even as hardware and software have evolved. Operati...
James R. Larus, Galen C. Hunt
CORR
2010
Springer
159views Education» more  CORR 2010»
13 years 8 months ago
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags
Radio Frequency Identification (RFID) technology one of the most promising technologies in the field of ubiquitous computing. Indeed, RFID technology may well replace barcode tech...
Eslam Gamal Ahmed, Eman Shaaban, Mohamed Hashem
PSYCHNOLOGY
2007
107views more  PSYCHNOLOGY 2007»
13 years 7 months ago
Discourses on Mobility and Technological Mediation: The Texture of Ubiquitous Interaction
Mobility is more and more mediated, supported and transformed by technological artefacts and infrastructures. Especially technologies labelled as mobile, pervasive, ubiquitous or ...
Giuseppina Pellegrino
PUC
2007
97views more  PUC 2007»
13 years 7 months ago
Supporting the unremarkable: experiences with the obje Display Mirror
Many believe that ubiquitous computing will succeed when it has faded into the background of everyday life and work—that is, when it has become mundane. This paper examines the ...
Mark W. Newman, Nicolas Ducheneaut, W. Keith Edwar...
INFOCOM
2010
IEEE
13 years 6 months ago
Beyond Triangle Inequality: Sifting Noisy and Outlier Distance Measurements for Localization
—Knowing accurate positions of nodes in wireless ad-hoc and sensor networks is essential for a wide range of pervasive and mobile applications. However, errors are inevitable in ...
Lirong Jian, Zheng Yang, Yunhao Liu