Sciweavers

1805 search results - page 36 / 361
» Understanding Code Mobility
Sort
View
SP
1998
IEEE
147views Security Privacy» more  SP 1998»
14 years 2 months ago
Secure Execution of Java Applets using a Remote Playground
Dahlia Malkhi, Michael K. Reiter, Aviel D. Rubin
ECAL
2005
Springer
14 years 3 months ago
The Genetic Coding Style of Digital Organisms
Recently, all the human genes were identified. But understanding the functions coded in the genes is of course a much harder problem. We are used to view DNA as some sort of a comp...
Philip Gerlee, Torbjörn Lundh
ISORC
2006
IEEE
14 years 3 months ago
Automated Logging of Mobile Phones Failures Data
The increasing complexity of mobile phones directly affects their reliability, while the user tolerance for failures becomes to decrease, especially when the phone is used for bus...
Paolo Ascione, Marcello Cinque, Domenico Cotroneo
MONET
2006
173views more  MONET 2006»
13 years 9 months ago
Exploiting Mobility for Energy Efficient Data Collection in Wireless Sensor Networks
We analyze an architecture based on mobility to address the problem of energy efficient data collection in a sensor network. Our approach exploits mobile nodes present in the senso...
Sushant Jain, Rahul Shah, Waylon Brunette, Gaetano...
MOBICOM
1999
ACM
14 years 2 months ago
Analysis of a Metropolitan-Area Wireless Network
We analyze a seven-week trace of the Metricom metropolitan-area packet radio wireless network to find how users take advantage of a mobile environment. Such understanding is criti...
Diane Tang, Mary Baker