Sciweavers

1777 search results - page 313 / 356
» Programming Cryptographic Protocols
Sort
View
EUROGP
2007
Springer
102views Optimization» more  EUROGP 2007»
14 years 2 months ago
Real-Time, Non-intrusive Evaluation of VoIP
Abstract. Speech quality, as perceived by the users of Voice over Internet Protocol (VoIP) telephony, is critically important to the uptake of this service. VoIP quality can be deg...
Adil Raja, R. Muhammad Atif Azad, Colin Flanagan, ...
ISI
2007
Springer
14 years 2 months ago
Design and Implementation of a Middleware for Sentient Spaces
— Surveillance is an important task for guaranteeing the security of individuals. Being able to intelligently monitor the activity in given spaces is essential to achieve such su...
Bijit Hore, Hojjat Jafarpour, Ramesh Jain, Shengyu...
MSN
2007
Springer
125views Sensor Networks» more  MSN 2007»
14 years 2 months ago
Ensuring Area Coverage in Hybrid Wireless Sensor Networks
Success of Wireless Sensor Networks largely depends whether the deployed network can provide desired coverage with acceptable network lifetime. This paper proposes a distributed pr...
Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha
CCGRID
2006
IEEE
14 years 2 months ago
Adapting Distributed Shared Memory Applications in Diverse Environments
A problem with running distributed shared memory applications in heterogeneous environments is that making optimal use of available resources often requires significant changes t...
Daniel Potts, Ihor Kuz
ETFA
2006
IEEE
14 years 2 months ago
Towards a File System Interface for Mobile Resources in Networked Embedded Systems
— Networks for real-time embedded systems are a key emerging technology for current and future systems. Such networks need to enable reliable communication without requiring sign...
Neil C. Audsley, R. Gao, Ameet Patil