Sciweavers

1036 search results - page 174 / 208
» Ubiquitous Verification of Ubiquitous Systems
Sort
View
IJIM
2008
60views more  IJIM 2008»
13 years 7 months ago
The Role of Podcasts in Students' Learning
Podcasts have been employed extensively in some countries and are now being trialed at a number of universities in Australia. They allow ubiquitous learning whereby students can ac...
Laurel Evelyn Dyson
CORR
2007
Springer
126views Education» more  CORR 2007»
13 years 7 months ago
Interference and Outage in Clustered Wireless Ad Hoc Networks
—In the analysis of large random wireless networks, the underlying node distribution is almost ubiquitously assumed to be the homogeneous Poisson point process. In this paper, th...
Radha Krishna Ganti, Martin Haenggi
CORR
2007
Springer
130views Education» more  CORR 2007»
13 years 7 months ago
Mobile Computing in Physics Analysis - An Indicator for eScience
This paper presents the design and implementation of a Grid-enabled physics analysis environment for handheld and other resource-limited computing devices as one example of the us...
Arshad Ali, Ashiq Anjum, Tahir Azim, Julian J. Bun...
CORR
2007
Springer
93views Education» more  CORR 2007»
13 years 7 months ago
A Framework for Providing E-Services to the Rural Areas using Wireless Ad Hoc and Sensor Networks
In recent years, the proliferation of mobile computing devices has driven a revolutionary change in the computing world. The nature of ubiquitous devices makes wireless networks th...
Al-Sakib Khan Pathan, Humayun Kadir Islam, Sabit A...
JALC
2006
125views more  JALC 2006»
13 years 7 months ago
A Confinement Criterion for Securely Executing Mobile Code
Mobile programs, like applets, are not only ubiquitous, but also potentially malicious. We study the case where mobile programs are executed by a host system in a secured environm...
Hervé Grall