Sciweavers

18697 search results - page 3629 / 3740
» Systemic Security Management
Sort
View
139
Voted
MAM
2007
127views more  MAM 2007»
15 years 4 months ago
Indoor solar energy harvesting for sensor network router nodes
A unique method has been developed to scavenge solar energy from monocrystalline solar cells to power wireless router nodes that are used in indoor applications. This method elimi...
Abhiman Hande, Todd Polk, William Walker, Dinesh B...
CG
2004
Springer
15 years 4 months ago
ANTS--Augmented Environments
When interacting with natural or urban environments there are many situations where the ability to access data in real time becomes relevant. Augmented Reality (AR) technologies a...
Teresa Romão, Nuno Correia, A. Eduardo Dias...
158
Voted
COMPUTER
2004
105views more  COMPUTER 2004»
15 years 4 months ago
SoftUDC: A Software-Based Data Center for Utility Computing
, abstracts each virtual machine's view of its storage and networks, and binds virtual machines across nodes into isolated virtual farms. The SoftUDC control system spans all ...
Mahesh Kallahalla, Mustafa Uysal, Ram Swaminathan,...
JODL
2000
123views more  JODL 2000»
15 years 4 months ago
On Z39.50 wrapping and description logics
Z39.50 is a client/server protocol widely used in digital libraries and museums for searching and retrieving information spread over a number of heterogeneous sources. To overcome ...
Yannis Velegrakis, Vassilis Christophides, Panos C...
174
Voted
AAMAS
1999
Springer
15 years 4 months ago
Fully Embodied Conversational Avatars: Making Communicative Behaviors Autonomous
: Although avatars may resemble communicative interface agents, they have for the most part not profited from recent research into autonomous embodied conversational systems. In pa...
Justine Cassell, Hannes Högni Vilhjálm...
« Prev « First page 3629 / 3740 Last » Next »