Sciweavers

1036 search results - page 43 / 208
» Ubiquitous Verification of Ubiquitous Systems
Sort
View
ISMAR
2008
IEEE
14 years 2 months ago
Dynamic gyroscope fusion in Ubiquitous Tracking environments
Ubiquitous Tracking (Ubitrack) setups, consisting of many previously unknown sensors, offer many possibilities to perform sensor fusion in order to increase robustness and accurac...
Daniel Pustka, Gudrun Klinker
HICSS
2002
IEEE
80views Biometrics» more  HICSS 2002»
14 years 17 days ago
Ubiquitous Computing: Omnipresent Technology in Support of Network Centric Warfare
The U.S. military is in the midst of a transformation. While business leaders moved quickly to put computing power in the hands of individuals, the military establishment has been...
Mark Adkins, John Kruse, Robert Younger
USS
2010
13 years 5 months ago
The Case for Ubiquitous Transport-Level Encryption
Today, Internet traffic is encrypted only when deemed necessary. Yet modern CPUs could feasibly encrypt most traffic. Moreover, the cost of doing so will only drop over time. Tcpc...
Andrea Bittau, Michael Hamburg, Mark Handley, Davi...
DCAI
2008
13 years 9 months ago
Management Ubiquitous of Messages and Documents Organizational through Intelligent Agents
In the context of artificial intelligence, the multiagent systems are an alternative solution to address complex problems and distributed. PAINALLI is an multi-agent architecture f...
Rosa Cano, Juan G. Sánchez, Cristian Pinz&o...
PERCOM
2008
ACM
14 years 7 months ago
Non-anchored Unified Naming for Ubiquitous Computing Environments
Users and developers require some way to identify by human readable names the many resources that comprise a ubiquitous computing environment. In addition, naming in such environm...
Yoo Chul Chung, Dongman Lee