Sciweavers

902 search results - page 102 / 181
» Opening Address
Sort
View
SUTC
2006
IEEE
14 years 2 months ago
Power-aware Node Deployment in Wireless Sensor Networks
Sensor networks have attracted intensive interests due to its extendable capability. In this paper, we attempt to answer a fundamental but practical question:” how should we dep...
Yunhuai Liu, Hoilun Ngan, Lionel M. Ni
WETICE
2006
IEEE
14 years 2 months ago
Handling Exceptional Conditions in Mobile Collaborative Applications: An Exploratory Case Study
The incorporation of exception handling strategies in mobile collaborative applications bring several challenges to middleware designers due to their intrinsic characteristics of ...
Nélio Cacho, Karla Damasceno, Alessandro Ga...
ACMICEC
2006
ACM
89views ECommerce» more  ACMICEC 2006»
14 years 2 months ago
A semantic web approach to handling soft constraints in virtual organisations
In this paper we present a proposal for representing soft constraint satisfaction problems (CSPs) within the Semantic Web architecture. The proposal is motivated by the need for a...
Alun D. Preece, Stuart Chalmers, Craig McKenzie, J...
MOBICOM
2006
ACM
14 years 2 months ago
Using packet probes for available bandwidth estimation: a wireless testbed experience
Evaluating available bandwidth estimation methods requires a malleable MAC protocol implementation, precise MAC layer packet timing measurements, and the ability to create control...
Mesut Ali Ergin, Marco Gruteser
WOWMOM
2006
ACM
191views Multimedia» more  WOWMOM 2006»
14 years 2 months ago
Privacy Preserving Trust Authorization Framework Using XACML
: Nowadays many organisations share sensitive services through open network systems and this raises the need for an authorization framework that can interoperate even when the part...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...