Sciweavers

166 search results - page 22 / 34
» pervasive 2009
Sort
View
PERCOM
2009
ACM
14 years 11 months ago
Towards Adaptive Resource-Driven Routing
In pervasive computing environments, applications find themselves in constantly changing operating conditions. Such applications often need to discover locally available resources ...
Angela Dalton, Christine Julien
CISIS
2009
IEEE
14 years 5 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
14 years 5 months ago
Monitoring High-Quality Wine Production using Wireless Sensor Networks
This work reports the experience on the design and deployment of a WSN-based system for monitoring the productive cycle of high-quality wine in a Sicilian winery. Besides providin...
Giuseppe Anastasi, Orazio Farruggia, Giuseppe Lo R...
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
14 years 5 months ago
Agile Principles and Ethical Conduct
Software practitioners experience pressure to compromise their work and their reasonable care for others. Even as software becomes more beneficial, pervasive, and interconnected, ...
Ken H. Judy
WETICE
2009
IEEE
14 years 5 months ago
Smart Metering the Clouds
— As cloud computing becomes increasingly pervasive, the data center energy consumption attributable to cloud computing is climbing, despite the clarion call of action to reduce ...
Tarry Singh, Pavan Kuman Vara