• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 8,336
Next 10 →

Wireless Communications

by Andrea Goldsmith, Anaïs Nin , 2005
"... Copyright c ○ 2005 by Cambridge University Press. This material is in copyright. Subject to statutory exception and to the provisions of relevant collective licensing agreements, no reproduction of any part may take place without the written permission of Cambridge University ..."
Abstract - Cited by 1129 (32 self) - Add to MetaCart
Copyright c ○ 2005 by Cambridge University Press. This material is in copyright. Subject to statutory exception and to the provisions of relevant collective licensing agreements, no reproduction of any part may take place without the written permission of Cambridge University

PARALLEL AND DISTRIBUTED SIMULATION SYSTEMS

by Richard M. Fujimoto , 2000
"... ..."
Abstract - Cited by 386 (22 self) - Add to MetaCart
Abstract not found

net of Things (IoT), Wireless Body Area Networks (WBANs)

by Ajmal Saw, Soufiene Djahel, Zonghua Zhang
"... Abstract—The rapid technological convergence between Inter- ..."
Abstract - Add to MetaCart
Abstract—The rapid technological convergence between Inter-

16. Network-Based Interaction

by Alan Dix
"... In some ways this chapter could be seen as redundant in a HCI book Ð surely networks are just an implementation mechanism, a detail below the surface, all that matters are the interfaces that are built on them. On the other hand, networked interfaces, especially the web, but increasingly also ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
In some ways this chapter could be seen as redundant in a HCI book Ð surely networks are just an implementation mechanism, a detail below the surface, all that matters are the interfaces that are built on them. On the other hand, networked interfaces, especially the web, but increasingly also

Article Providing IoT Services in Smart Cities through Dynamic Augmented Reality Markers

by David Chaves-diéguez, Re Pellitero-rivero, Daniel García-coego, Francisco Javier González-castaño, Pedro Salvador Rodríguez-hernández, Óscar Piñeiro-gómez, Felipe Gil-castiñeira, Enrique Costa-montenegro , 2015
"... sensors ..."
Abstract - Add to MetaCart
Abstract not found

Building Secure and Reliable Network Applications

by Kenneth Birman , 1996
"... ly, the remote procedure call problem, which an RPC protocol undertakes to solve, consists of emulating LPC using message passing. LPC has a number of "properties" -- a single procedure invocation results in exactly one execution of the procedure body, the result returned is reliably deliv ..."
Abstract - Cited by 232 (16 self) - Add to MetaCart
ly, the remote procedure call problem, which an RPC protocol undertakes to solve, consists of emulating LPC using message passing. LPC has a number of "properties" -- a single procedure invocation results in exactly one execution of the procedure body, the result returned is reliably delivered to the invoker, and exceptions are raised if (and only if) an error occurs. Given a completely reliable communication environment, which never loses, duplicates, or reorders messages, and given client and server processes that never fail, RPC would be trivial to solve. The sender would merely package the invocation into one or more messages, and transmit these to the server. The server would unpack the data into local variables, perform the desired operation, and send back the result (or an indication of any exception that occurred) in a reply message. The challenge, then, is created by failures. Were it not for the possibility of process and machine crashes, an RPC protocol capable of overcomi...

The Security and Privacy of Smart Vehicles

by Jean-Pierre Hubaux, Srdjan Capkun, Jun Luo , 2004
"... Road safety, traffic management, and driver convenience continue to improve, in large part thanks to appropriate usage of information technology. But this evolution has deep implications for security and privacy, which the research community has overlooked so far. ..."
Abstract - Cited by 159 (7 self) - Add to MetaCart
Road safety, traffic management, and driver convenience continue to improve, in large part thanks to appropriate usage of information technology. But this evolution has deep implications for security and privacy, which the research community has overlooked so far.

The Technological Society

by Jacques Ellul, Robert K. Merton, A Vintage Book , 1964
"... A penetrating analysis of our technical civilization and of the effect of an increasingly standardized culture on the future of man ..."
Abstract - Cited by 259 (1 self) - Add to MetaCart
A penetrating analysis of our technical civilization and of the effect of an increasingly standardized culture on the future of man

Revolutionizing Science and Engineering Through Cyberinfrastructure

by Daniel E. Atkins, Kelvin K. Droegemeier, Stuart I. Feldman, Hector Garcia-molina, Michael L. Klein, David G. Messerschmitt, Paul Messina, Jeremiah P. Ostriker, Margaret H. Wright , 2003
"... This report was prepared by an officially appointed advisory panel to the National Science Foundation, however, any opinions, findings, and conclusions or recommendations expressed in this material are those of the panel and do not necessarily reflect the ..."
Abstract - Cited by 230 (0 self) - Add to MetaCart
This report was prepared by an officially appointed advisory panel to the National Science Foundation, however, any opinions, findings, and conclusions or recommendations expressed in this material are those of the panel and do not necessarily reflect the

System Architecture for Wireless Sensor Networks

by Jason Lester Hill, Jason Lester Hill, Jason Lester Hill , 2003
"... ..."
Abstract - Cited by 119 (1 self) - Add to MetaCart
Abstract not found
Next 10 →
Results 1 - 10 of 8,336
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University