Sciweavers

964 search results - page 124 / 193
» Virtual Conference Management System
Sort
View
CASES
2006
ACM
14 years 4 months ago
Automated compile-time and run-time techniques to increase usable memory in MMU-less embedded systems
Random access memory (RAM) is tightly-constrained in many embedded systems. This is especially true for the least expensive, lowest-power embedded systems, such as sensor network ...
Lan S. Bai, Lei Yang, Robert P. Dick
MM
2006
ACM
116views Multimedia» more  MM 2006»
14 years 4 months ago
Mobile camera supported document redirection
In this demonstration, we are going to illustrate how to use a mobile camera to redirect documents to various devices connected to the same network. Categories and Subject Descrip...
Qiong Liu, Paul McEvoy, Cheng-Jia Lai
GI
2005
Springer
14 years 3 months ago
RFID middleware design - addressing both application needs and RFID constraints
: Radio Frequency Identification (RFID) technology has a lot of potential to bridge the gap between the virtual world of enterprise IT systems and the real world of products and l...
Christian Floerkemeier, Matthias Lampe
CCS
2010
ACM
13 years 11 months ago
Securing wireless sensor networks against large-scale node capture attacks
Securing wireless sensor networks against node capture is a challenging task. All well-known random key pre-distribution systems, including the Eschenauer and Gligor's pionee...
Tuan Manh Vu, Reihaneh Safavi-Naini, Carey William...
PVLDB
2010
163views more  PVLDB 2010»
13 years 8 months ago
Event Processing - past, present and future
Analysts have marked Event Processing as the most growing segment in enterprise computing during years 2008 and 2009, furthermore, this trend is expected to continue. Many of the ...
Opher Etzion