Sciweavers

1605 search results - page 321 / 321
» Using directionality in mobile routing
Sort
View
OSDI
2000
ACM
14 years 6 days ago
Processes in KaffeOS: Isolation, Resource Management, and Sharing in Java
Single-language runtime systems, in the form of Java virtual machines, are widely deployed platforms for executing untrusted mobile code. These runtimes provide some of the featur...
Godmar Back, Wilson C. Hsieh, Jay Lepreau
RAS
2008
156views more  RAS 2008»
13 years 10 months ago
Curious George: An attentive semantic robot
State-of-the-art methods have recently achieved impressive performance for recognising the objects present in large databases of pre-collected images. There has been much less foc...
David Meger, Per-Erik Forssén, Kevin Lai, S...
TMC
2010
158views more  TMC 2010»
13 years 9 months ago
Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes
—Secure distance-based localization in the presence of cheating beacon (or anchor) nodes is an important problem in mobile wireless ad hoc and sensor networks. Despite significa...
Murtuza Jadliwala, Sheng Zhong, Shambhu J. Upadhya...
MOBICOM
2012
ACM
12 years 1 months ago
Temporal reachability graphs
While a natural fit for modeling and understanding mobile networks, time-varying graphs remain poorly understood. Indeed, many of the usual concepts of static graphs have no obvi...
John Whitbeck, Marcelo Dias de Amorim, Vania Conan...
WECWIS
2003
IEEE
205views ECommerce» more  WECWIS 2003»
14 years 4 months ago
Beyond "web of trust": Enabling P2P E-commerce
The huge success of eBay has proven the demand for customer-to-customer (C2C) electronic commerce. eBay is a centralized infrastructure with all its scalability problems (network ...
Anwitaman Datta, Manfred Hauswirth, Karl Aberer