Sciweavers

1777 search results - page 345 / 356
» Programming Cryptographic Protocols
Sort
View
NORDICHI
2006
ACM
14 years 2 months ago
Active surfaces: a novel concept for end-user composition
This paper describes the design process of a modular system for supporting physical and cognitive rehabilitation in the swimming pool. In such an environment, the therapist is cal...
Erik Grönvall, Patrizia Marti, Alessandro Pol...
INFOCOM
2005
IEEE
14 years 2 months ago
Optimal ISP subscription for Internet multihoming: algorithm design and implication analysis
— Multihoming is a popular method used by large enterprises and stub ISPs to connect to the Internet to reduce cost and improve performance. Recently researchers have studied the...
Hao Wang, Haiyong Xie 0002, Lili Qiu, Abraham Silb...
MSWIM
2005
ACM
14 years 2 months ago
Getting urban pedestrian flow from simple observation: realistic mobility generation in wireless network simulation
In order for precise evaluation of MANET applications, more realistic mobility models are needed in wireless network simulations. In this paper, we focus on the behavior of pedest...
Kumiko Maeda, Kazuki Sato, Kazuki Konishi, Akiko Y...
FPL
2005
Springer
122views Hardware» more  FPL 2005»
14 years 2 months ago
FPGA-Aware Garbage Collection in Java
— During codesign of a system, one still runs into the impedance mismatch between the software and hardware worlds. er identifies the different levels of abstraction of hardware...
Philippe Faes, Mark Christiaens, Dries Buytaert, D...
MM
2004
ACM
147views Multimedia» more  MM 2004»
14 years 2 months ago
Implementation and evaluation of EXT3NS multimedia file system
The EXT3NS is a scalable file system designed to handle video streaming workload in large-scale on-demand streaming services. It is based on a special H/W device, called Network-S...
Baik-Song Ahn, Sung-Hoon Sohn, Chei-Yol Kim, Gyu-I...