Sciweavers

1036 search results - page 106 / 208
» Ubiquitous Verification of Ubiquitous Systems
Sort
View
ICEIS
2009
IEEE
14 years 4 months ago
Towards Successful Virtual Communities
With the multiplication of communication medium, the increasing multi-partner global organizations, the remote working tendencies, dynamic teams, pervasive or ubiquitous computing ...
Julien Subercaze, Christo El-Morr, Pierre Maret, A...
DATE
2008
IEEE
106views Hardware» more  DATE 2008»
14 years 4 months ago
Modeling Event Stream Hierarchies with Hierarchical Event Models
Compositional Scheduling Analysis couples local scheduling analysis via event streams. While local analysis has successfully been extended to include hierarchical scheduling strat...
Jonas Rox, Rolf Ernst
HICSS
2008
IEEE
88views Biometrics» more  HICSS 2008»
14 years 4 months ago
An Analysis of Korean National Information Strategy of IT839
Recently, the Korean government launched the IT839 project with the objective of converting Korea into a ubiquitous information society. This study investigates the role of the Ko...
Dong Hee Shin, Won-Yong Kim
HASE
2007
IEEE
14 years 4 months ago
Fuzzing Wi-Fi Drivers to Locate Security Vulnerabilities
Wireless LANs (WLAN) are becoming ubiquitous, as more and more consumer electronic equipments start to support them. This creates new security concerns, since hackers no longer ne...
Manuel Mendonça, Nuno Ferreira Neves
ICDE
2007
IEEE
129views Database» more  ICDE 2007»
14 years 4 months ago
Multimedia Content Repurposing in Ambient Intelligent Environments
Multimedia content repurposing is a challenging task that aims to adapt and deliver media content to client devices by considering the heterogeneity pertaining to users, terminals...
M. Shamim Hossain, M. Anwar Hossain, Abdulmotaleb ...