Sciweavers

1036 search results - page 192 / 208
» Ubiquitous Verification of Ubiquitous Systems
Sort
View
VTC
2007
IEEE
183views Communications» more  VTC 2007»
14 years 1 months ago
Multimedia over 802.15.4 and ZigBee Networks for Ambient Environment Control
—WPAN technologies such as IEEE 802.15.4 have been introduced to allow for energy-efficient communication of control and sensor data. In certain application areas, it is benefici...
Ralf Burda, Christian Wietfeld
VLDB
2007
ACM
295views Database» more  VLDB 2007»
14 years 1 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
NETGAMES
2006
ACM
14 years 1 months ago
Meeting technology challenges of pervasive augmented reality games
Pervasive games provide a new type of game combining new technologies with the real environment of the players. While this already poses new challenges to the game developer, requ...
Wolfgang Broll, Jan Ohlenburg, Irma Lindt, Iris He...
PLDI
2006
ACM
14 years 1 months ago
The Compressor: concurrent, incremental, and parallel compaction
The widely used Mark-and-Sweep garbage collector has a drawback in that it does not move objects during collection. As a result, large long-running realistic applications, such as...
Haim Kermany, Erez Petrank
ESOP
2005
Springer
14 years 1 months ago
Asserting Bytecode Safety
Abstract. We instantiate an Isabelle/HOL framework for proof carrying code to Jinja bytecode, a downsized variant of Java bytecode featuring objects, inheritance, method calls and ...
Martin Wildmoser, Tobias Nipkow