Sciweavers

3031 search results - page 508 / 607
» Reuse in the application layer
Sort
View
MATA
2004
Springer
14 years 3 months ago
Distributed Shared Contexts
Mobile solutions have gone beyond the role of personal tool to offer solutions in supporting coordinated work. Mobile workers shift constantly from individual to group work, access...
Rosa Alarcón, César A. Collazos, Lui...
MIDDLEWARE
2004
Springer
14 years 3 months ago
Kernel-middleware interaction to support adaptation in pervasive computing environments
In pervasive computing environments, conditions are highly variable and resources are limited. In order to meet the needs of applications, systems must adapt dynamically to changi...
Farshad A. Samimi, Philip K. McKinley, Seyed Masou...
CHI
2010
ACM
14 years 3 months ago
Occlusion-aware interfaces
We define occlusion-aware interfaces as interaction techniques which know what area of the display is currently occluded, and use this knowledge to counteract potential problems a...
Daniel Vogel, Ravin Balakrishnan
INFOCOM
2003
IEEE
14 years 3 months ago
Distributed Construction of Random Expander Networks
— We present a novel distributed algorithm for constructing random overlay networks that are composed of d Hamilton cycles. The protocol is completely decentralized as no globall...
Ching Law, Kai-Yeung Siu
ISCC
2003
IEEE
112views Communications» more  ISCC 2003»
14 years 3 months ago
Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol
WTLS (Wireless Transport Layer Security) is an important standard protocol for secure wireless access to Internet services. WTLS employs public-key cryptosystems during the handsh...
Albert Levi, Erkay Savas