Sciweavers

5515 search results - page 1068 / 1103
» Software architecture: a roadmap
Sort
View
ELPUB
2006
ACM
14 years 2 months ago
A New Concept in High Resolution Internet Image Browsing
Various new imaging techniques have been used at the C2RMF, in order to digitize paintings and objects. These techniques are used for extensive and detailed non-destructive analys...
Denis Pitzalis, Ruven Pillay, Christian Lahanier
IMC
2006
ACM
14 years 2 months ago
The need for cross-layer information in access point selection algorithms
The low price of commodity wireless LAN cards and access points (APs) has resulted in the rich proliferation of high density WLANs in enterprise, academic environments, and public ...
Karthikeyan Sundaresan, Konstantina Papagiannaki
IWCMC
2006
ACM
14 years 2 months ago
TARP: trust-aware routing protocol
Security is a critical issue in a mobile ad hoc network (MANET). In most of the previous protocols security is an added layer above the routing protocol. We propose a TrustAware R...
Loay Abusalah, Ashfaq A. Khokhar, G. BenBrahim, W....
MSWIM
2006
ACM
14 years 2 months ago
An application-driven perspective on wireless sensor network security
Wireless sensor networks (WSNs) have recently attracted a lot of interest due to the range of applications they enable. Unfortunately, WSNs are exposed to numerous security threat...
Eric Sabbah, Adnan Majeed, Kyoung-Don Kang, Ke Liu...
NETGAMES
2006
ACM
14 years 2 months ago
Meeting technology challenges of pervasive augmented reality games
Pervasive games provide a new type of game combining new technologies with the real environment of the players. While this already poses new challenges to the game developer, requ...
Wolfgang Broll, Jan Ohlenburg, Irma Lindt, Iris He...
« Prev « First page 1068 / 1103 Last » Next »