Sciweavers

89 search results - page 13 / 18
» The Efficient Maintenance of Access Roles with Role Hiding
Sort
View
ICPPW
2008
IEEE
14 years 1 months ago
Energy Modeling of Processors in Wireless Sensor Networks Based on Petri Nets
Power minimization is a serious issue in wireless sensor networks to extend the lifetime and minimize costs. However, in order to gain an accurate understanding of issues regardin...
Ali Shareef, Yifeng Zhu
VL
2008
IEEE
149views Visual Languages» more  VL 2008»
14 years 1 months ago
Collaborative end-user development on handheld devices
Web 2.0 has enabled end users to collaborate through their own developed artifacts, moving on from text (e.g., Wikipedia, Blogs) to images (e.g., Flickr) and movies (e.g., YouTube...
Navid Ahmadi, Alexander Repenning, Andri Ioannidou
SAINT
2007
IEEE
14 years 1 months ago
SPICE: Evolving IMS to Next Generation Service Platforms
Today's wireless and mobile services are typically monolithic and often centralized in nature, which limits heterogeneous service access and shared service usage. New sources...
Sasu Tarkoma, Christian Prehofer, Anna V. Zhdanova...
LREC
2010
156views Education» more  LREC 2010»
13 years 8 months ago
Propbank Instance Annotation Guidelines Using a Dedicated Editor, Jubilee
This paper gives guidelines of how to annotate Propbank instances using a dedicated editor, Jubilee. Propbank is a corpus in which the arguments of each verb predicate are annotat...
Jinho D. Choi, Claire Bonial, Martha Palmer
JDCTA
2008
88views more  JDCTA 2008»
13 years 7 months ago
A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN
In WSNs, since the attacks, such as jamming or eavesdropping without physical access, easily occur, security is one of the important requirements for WSNs. The key pre-distributio...
Yoon-Su Jeong, Yong-Tae Kim, Gil-Cheol Park, Sang ...