Sciweavers

950 search results - page 183 / 190
» presence 2008
Sort
View
RTAS
2008
IEEE
14 years 4 months ago
Bounding Worst-Case Response Time for Tasks with Non-Preemptive Regions
Real-time schedulability theory requires a priori knowledge of the worst-case execution time (WCET) of every task in the system. Fundamental to the calculation of WCET is a schedu...
Harini Ramaprasad, Frank Mueller
SECON
2008
IEEE
14 years 4 months ago
SYNAPSE: A Network Reprogramming Protocol for Wireless Sensor Networks Using Fountain Codes
—Wireless reprogramming is a key functionality in Wireless Sensor Networks (WSNs). In fact, the requirements for the network may change in time, or new parameters might have to b...
Michele Rossi, Giovanni Zanca, Luca Stabellini, Ri...
SECURWARE
2008
IEEE
14 years 4 months ago
ToLeRating UR-STD
A new emerging paradigm of Uncertain Risk of Suspicion, Threat and Danger, observed across the field of information security, is described. Based on this paradigm a novel approac...
Jan Feyereisl, Uwe Aickelin
VR
2008
IEEE
155views Virtual Reality» more  VR 2008»
14 years 4 months ago
The Effects of Virtual Reality, Augmented Reality, and Motion Parallax on Egocentric Depth Perception
As the use of virtual and augmented reality applications becomes more common, the need to fully understand how observers perceive spatial relationships grows more critical. One of...
Adam Jones, J. Edward Swan II, Gurjot Singh, Eric ...
DBPL
2005
Springer
143views Database» more  DBPL 2005»
14 years 3 months ago
Inconsistency Tolerance in P2P Data Integration: An Epistemic Logic Approach
We study peer-to-peer ðP2PÞ data integration, where each peer models an autonomous system that exports data in terms of its own schema, and data interoperation is achieved by me...
Diego Calvanese, Giuseppe De Giacomo, Domenico Lem...