Sciweavers

199 search results - page 33 / 40
» pervasive 2005
Sort
View
PERCOM
2005
ACM
14 years 8 months ago
Secure context-sensitive authorization
There is a recent trend toward rule-based authorization systems to achieve flexible security policies. Also, new sensing technologies in pervasive computing make it possible to de...
Kazuhiro Minami, David Kotz
PERCOM
2005
ACM
14 years 8 months ago
Reducing the Calibration Effort for Location Estimation Using Unlabeled Samples
WLAN location estimation based on 802.11 signal strength is becoming increasingly prevalent in today's pervasive computing applications. As alternative to the wellestablished...
Xiaoyong Chai, Qiang Yang
AINA
2005
IEEE
14 years 2 months ago
An Architecture for Automated QoS Resolution in Wireless Systems
: The pervasive nature of mobile and wireless systems has led to increased concerns over Quality of Service (QoS). In the prevailing models for QoS management, QoS resolution is ac...
Behzad Bordbar, Rachid Anane
CEC
2005
IEEE
14 years 2 months ago
Localization using evolution strategies in sensornets
With the emergence of wireless sensor networks and pervasive computing, innovative location-aware technologies and services are being investigated. Several iterative approaches emp...
Mark Terwilliger, Ajay K. Gupta, Ashfaq A. Khokhar...
HPCA
2005
IEEE
14 years 2 months ago
Chip Multithreading: Opportunities and Challenges
Chip Multi-Threaded (CMT) processors provide support for many simultaneous hardware threads of execution in various ways, including Simultaneous Multithreading (SMT) and Chip Mult...
Lawrence Spracklen, Santosh G. Abraham