Sciweavers

2178 search results - page 409 / 436
» Toward Systemically Secure IT Architectures
Sort
View
AICT
2006
IEEE
225views Communications» more  AICT 2006»
13 years 9 months ago
Migration to 4 G: Mobile IP based Solutions
Fourth Generation (4G) is the next generation of wireless networks that will replace third Generation (3G) networks sometimes in future. 4G is intended to provide high speed, high...
K. R. Santhi, G. Senthil Kumaran
DAGSTUHL
1996
13 years 9 months ago
A Uniform Approach for Compile-Time and Run-Time Specialization
As partial evaluation gets more mature, it is now possible to use this program transformation technique to tackle realistic languages and real-size application programs. However, t...
Charles Consel, Luke Hornof, François No&eu...
AROBOTS
2007
129views more  AROBOTS 2007»
13 years 7 months ago
Behaviors for physical cooperation between robots for mobility improvement
— A team of small, low-cost robots instead of a single large, complex robot is useful in operations such as search and rescue, urban exploration etc. However, the performance of ...
Ashish Deshpande, Jonathan E. Luntz
INFFUS
2007
107views more  INFFUS 2007»
13 years 7 months ago
An information fusion demonstrator for tactical intelligence processing in network-based defense
The Swedish Defence Research Agency (FOI) has developed a concept demonstrator called the Information Fusion Demonstrator 2003 (IFD03) for demonstrating information fusion methodo...
Simon Ahlberg, Pontus Hörling, Katarina Johan...
OTM
2010
Springer
13 years 5 months ago
On the Expressiveness and Trade-Offs of Large Scale Tuple Stores
Massive-scale distributed computing is a challenge at our doorstep. The current exponential growth of data calls for massive-scale capabilities of storage and processing. This is b...
Ricardo Vilaça, Francisco Cruz, Rui Carlos ...