Sciweavers

5748 search results - page 866 / 1150
» Web Engineering Resources
Sort
View
165
Voted
ICESS
2005
Springer
15 years 9 months ago
Swarm Based Sensor Deployment Optimization in Ad Hoc Sensor Networks
Abstract. In ad hoc sensor networks, sensor nodes have very limited energy resources, thus energy consuming operations such as data collection, transmission and reception must be k...
Xiaoling Wu, Shu Lei, Jie Yang, Hui Xu, Jinsung Ch...
MIDDLEWARE
2005
Springer
15 years 9 months ago
A context-aware middleware for multimodal dialogue applications with context tracing
This paper presents a context-aware middleware for multimodal dialogue applications. The middleware has the context tracing feature, which is the possibility of the middleware to ...
Manh-Thang Tran, Béat Hirsbrunner, Mich&egr...
UIST
2004
ACM
15 years 9 months ago
A gesture-based authentication scheme for untrusted public terminals
Powerful mobile devices with minimal I/O capabilities increase the likelihood that we will want to annex these devices to I/O resources we encounter in the local environment. This...
Shwetak N. Patel, Jeffrey S. Pierce, Gregory D. Ab...
EMSOFT
2004
Springer
15 years 9 months ago
An event detection algebra for reactive systems
In reactive systems, execution is driven by external events to which the system should respond with appropriate actions. Such events can be simple, but systems are often supposed ...
Jan Carlson, Björn Lisper
ISW
2004
Springer
15 years 9 months ago
The Obfuscation Executive
Abstract. Code obfuscations are semantics-preserving code transformations used to protect a program from reverse engineering. There is generally no expectation of complete, long-te...
Kelly Heffner, Christian S. Collberg