Sciweavers

1988 search results - page 337 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
DFT
2003
IEEE
99views VLSI» more  DFT 2003»
14 years 2 months ago
Dependability Analysis of CAN Networks: An Emulation-Based Approach
1 Today many safety-critical applications are based on distributed systems where several computing nodes exchange information via suitable network interconnections. An example of t...
J. Pérez, Matteo Sonza Reorda, Massimo Viol...
CIKM
2001
Springer
14 years 1 months ago
Caching Constrained Mobile Data
As mobile devices get ubiquitous and grow in computational power, their management of interdependent data also becomes increasingly important. The mobile environment exhibits all ...
Subhasish Mazumdar, Mateusz Pietrzyk, Panos K. Chr...
CEC
2010
IEEE
13 years 15 days ago
Co-evolutionary search path planning under constrained information-sharing for a cooperative unmanned aerial vehicle team
—Mobile cooperative sensor networks are increasingly used for surveillance and reconnaissance tasks to support domain picture compilation. However, efficient distributed informat...
Jean Berger, Jens Happe
SIGMOD
2009
ACM
153views Database» more  SIGMOD 2009»
14 years 9 months ago
ELMR: lightweight mobile health records
Cell phones are increasingly being used as common clients for a wide suite of distributed, database-centric healthcare applications in developing regions. This is particularly tru...
Arvind Kumar, Amey Purandare, Jay Chen, Arthur Mea...
ATAL
2007
Springer
14 years 26 days ago
Towards reflective mobile agents for resource-constrained mobile devices
The vision of ubiquitous computing is one in which resource constrained mobile devices form ad-hoc networks to enable the delivery of services that are sensitive and responsive to...
Conor Muldoon, Gregory M. P. O'Hare, John F. Bradl...