Sciweavers

6480 search results - page 1218 / 1296
» Proximity Communication and Time
Sort
View
MOBILITY
2009
ACM
15 years 11 months ago
Feasibility evaluation of a communication-oriented P2P system in mobile environments
We present the feasibility evaluation of a structured communication-oriented Peer-to-Peer (P2P) system being used in mobile environments in this paper. The different levels of chu...
Zhonghong Ou, Erkki Harjula, Otso Kassinen, Mika Y...
SACMAT
2009
ACM
15 years 11 months ago
Analysis of virtual machine system policies
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger
SOUPS
2009
ACM
15 years 11 months ago
A "nutrition label" for privacy
We used an iterative design process to develop a privacy label that presents to consumers the ways organizations collect, use, and share personal information. Many surveys have sh...
Patrick Gage Kelley, Joanna Bresee, Lorrie Faith C...
IPSN
2010
Springer
15 years 11 months ago
Distributed estimation of linear acceleration for improved accuracy in wireless inertial motion capture
Motion capture using wireless inertial measurement units (IMUs) has many advantages over other techniques. Achieving accurate tracking with IMUs presents a processing challenge, e...
A. D. Young, M. J. Ling, D. K. Arvind
ANSS
2008
IEEE
15 years 11 months ago
Simulation of Buffer Management Policies in Networks for Grids
Grid technologies are emerging as the next generation of distributed computing, allowing the aggregation of resources that are geographically distributed across different location...
Agustín C. Caminero, Anthony Sulistio, Blan...
« Prev « First page 1218 / 1296 Last » Next »