Sciweavers

6781 search results - page 1152 / 1357
» Processors for Mobile Applications
Sort
View
IWSOS
2009
Springer
14 years 4 months ago
Revisiting P2P Content Sharing in Wireless Ad Hoc Networks
Classical content sharing applications like BitTorrent are not designed to run over wireless networks. When adapting them to these constrained networks, two main problems arise. On...
Mohamed Karim Sbai, Chadi Barakat
ICDCS
2008
IEEE
14 years 4 months ago
Quality of Trilateration: Confidence Based Iterative Localization
—The proliferation of wireless and mobile devices has fostered the demand for context-aware applications, in which location is one of the most significant contexts. Multilaterati...
Zheng Yang, Yunhao Liu
ICDCSW
2008
IEEE
14 years 4 months ago
RETROFIT: Reliable Exchanges through Resilient Overlays for Internet Teleoperation
Emergence of successful teleoperation applications requires the convergence of diverse domains like robotics, machine learning, sensing, actuation, control and communication. We e...
Invited Talk Lakshamanan, Raj Rajkumar
ICST
2008
IEEE
14 years 4 months ago
Verifying and Analyzing Adaptive Logic through UML State Models
It is becoming increasingly important to be able to adapt an application’s behavior at run time in response to changing requirements and environmental conditions. Adaptive progr...
Andres J. Ramirez, Betty H. C. Cheng
NDSS
2008
IEEE
14 years 4 months ago
Exploiting Opportunistic Scheduling in Cellular Data Networks
Third Generation (3G) cellular networks utilize timevarying and location-dependent channel conditions to provide broadband services. They employ opportunistic scheduling to effic...
Radmilo Racic, Denys Ma, Hao Chen, Xin Liu
« Prev « First page 1152 / 1357 Last » Next »