Sciweavers

2024 search results - page 374 / 405
» Providing Secure Environments for Untrusted Network Applicat...
Sort
View
ICDCSW
2008
IEEE
14 years 3 months ago
Design and Implementation of a WSN-Based Intelligent Light Control System
—Recently, wireless sensor networks (WSNs) have been widely discussed in many applications. In this paper, we propose a WSN-based intelligent light control system for indoor envi...
Meng-Shiuan Pan, Lun-Wu Yeh, Yen-Ann Chen, Yu-Hsua...
AINA
2007
IEEE
14 years 20 days ago
On the Design of an Efficient Architecture for Supporting Large Crowds of Autonomous Agents
Crowd simulations require both rendering visually plausible images and managing the behavior of autonomous agents. Therefore, these applications need an efficient design that allo...
Miguel Lozano, Pedro Morillo, Juan M. Orduñ...
IKE
2007
13 years 10 months ago
Spatial and Temporal Target Association through Semantic Analysis and GPS Data Mining
- We present an application for analyzing temporal and spatial interaction in an Association Network environment based on integrating Global Positioning Systems (GPS) Data, RDF Met...
David Luper, Delroy Cameron, John Miller, Hamid R....
COMCOM
2010
133views more  COMCOM 2010»
13 years 8 months ago
Supporting mobility in an IMS-based P2P IPTV service: A proactive context transfer mechanism
In recent years, IPTV has received an increasing amount of interest from the industry, commercial providers and the research community, alike. In this context, standardization bod...
Iván Vidal, Jaime García-Reinoso, An...
HICSS
2007
IEEE
258views Biometrics» more  HICSS 2007»
14 years 3 months ago
Enterprise Architecture and IT Governance: A Risk-Based Approach
The USCP had enormous challenges with its IT Program and support to the internal and external stakeholders of the Department, because of a fragile IT infrastructure. The IT Progra...
James R. Getter