Sciweavers

3160 search results - page 152 / 632
» Postcards from the future
Sort
View
COMSUR
2011
203views Hardware» more  COMSUR 2011»
12 years 8 months ago
Overcoming Adversaries in Sensor Networks: A Survey of Theoretical Models and Algorithmic Approaches for Tolerating Malicious In
Interference is an unavoidable property of the wireless communication medium and, in sensor networks, such interference is exacerbated due to the energy-starved nature of the netw...
Maxwell Young, Raouf Boutaba
DCOSS
2011
Springer
12 years 8 months ago
Type-safe updating for modular WSN software
—Modular software, in which strongly-separated units of functionality can be independently added to and removed from a node’s running software, offers a promising approach to e...
Barry Porter, Utz Roedig, Geoff Coulson
ECIS
2011
12 years 8 months ago
Adaptive persuasive messages in an e-commerce setting: the use of persuasion profiles
Technologies that are intentionally designed to change a person’s attitude or behaviors are emergent. Designers of these technologies frequently use implementations of influence...
Maurits Kaptein
EI
2011
100views more  EI 2011»
12 years 8 months ago
Grid regulation in Austria: smart grids incentives or disincentives?
On European and national level grid initiatives, technology platforms as well as other stakeholders are debating how the future grid structure should be organised to cope with upc...
Natalie Prüggler, Christoph Bremberger
EL
2011
86views more  EL 2011»
12 years 8 months ago
The use of metadata and preservation methods for continuous access to digital data
Data loss prevention starts with the creation of a digital object. However, methods to minimize the loss of digital data are often ignored, the use of metadata structures embedded...
Ria Groenewald, Amelia Breytenbach