Sciweavers

813 search results - page 100 / 163
» desire 2010
Sort
View
JUCS
2010
162views more  JUCS 2010»
13 years 8 months ago
Enabling Personal Privacy for Pervasive Computing Environments
: Protection of personal data in the Internet is already a challenge today. Users have to actively look up privacy policies of websites and decide whether they can live with the te...
Susana Alcalde Bagüés, Andreas Zeidler...
JUCS
2010
154views more  JUCS 2010»
13 years 8 months ago
An Ambient Assisted Living Platform Integrating RFID Data-on-Tag Care Annotations and Twitter
: Although RFID is mainly used to identify objects whose data can then be accessed over the network, passive HF RFID tags do have significant data storage capacity (up to 4K), whic...
Diego López-de-Ipiña, Ignacio D&iacu...
JUCS
2010
132views more  JUCS 2010»
13 years 8 months ago
A Mobile Intelligent Interruption Management System
: Mobile phones have become the most hated device that people cannot live without. For its primary usage as a communication device, it has surpassed any other medium. But it comes ...
Sina Zulkernain, Praveen Madiraju, Sheikh Iqbal Ah...
KBSE
2010
IEEE
13 years 8 months ago
Automated program repair through the evolution of assembly code
A method is described for automatically repairing legacy software at the assembly code level using evolutionary computation. The technique is demonstrated on Java byte code and x8...
Eric Schulte, Stephanie Forrest, Westley Weimer
MDM
2010
Springer
213views Communications» more  MDM 2010»
13 years 8 months ago
Towards Adaptive Sensor Data Management for Distributed Fire Evacuation Infrastructure
— We introduce a novel strategy for data processing in Wireless Sensor Networks (WSNs) in the case of emergency fire evacuation with stringent delay constraints. Such networks sh...
Andrii Cherniak, Vladimir Zadorozhny