Sciweavers

759 search results - page 72 / 152
» What Can Be Implemented Anonymously
Sort
View
INFOCOM
2005
IEEE
14 years 3 months ago
SyncScan: practical fast handoff for 802.11 infrastructure networks
Abstract— Wireless access networks scale by replicating base stations geographically and then allowing mobile clients to seamlessly “hand off” from one station to the next as...
Ishwar Ramani, Stefan Savage
ISMIR
2004
Springer
154views Music» more  ISMIR 2004»
14 years 3 months ago
Mapping Music In The Palm Of Your Hand, Explore And Discover Your Collection
The trends of miniaturization and increasing storage capabilities for portable music players made it possible to carry increasingly more music on small portable devices, but it al...
Fabio Vignoli, Rob van Gulik, Huub van de Wetering
DEXAW
2003
IEEE
108views Database» more  DEXAW 2003»
14 years 3 months ago
Electronic Voting Systems: Security Implications of the Administrative Workflow
With the rapid growth of the Internet, online voting appears to be a reasonable alternative to conventional elections and other opinion expressing processes. Current research focu...
Costas Lambrinoudakis, Spyros Kokolakis, Maria Kar...
RTAS
2003
IEEE
14 years 3 months ago
Towards Predictable Real-time Java Object Request Brokers
Distributed real-time and embedded (DRE) applications often possess stringent quality of service (QoS) requirements. Designing middleware for DRE applications poses several challe...
Arvind S. Krishna, Raymond Klefstad, Douglas C. Sc...
WCRE
2003
IEEE
14 years 3 months ago
Reconstructing Software Architecture for J2EE Web Applications
In this paper we describe our approach to reconstructing the software architecture of J2EE web applications. We use the Siemens Four Views approach, separating the architecture in...
Minmin Han, Christine Hofmeister, Robert L. Nord