The eSleeve: a novel wearable computer configuration for the discovery of situated information - Trang 793-796
C. Randell, H.L. Muller
Describes work in progress on wearable computing configurations which provide audio and visual output based on the position and orientation of the user. We introduce the 'eSleeve'-a wearable wrist computer with position and heading sensors combined with a user interface employing speech recognition and a small display. Applications described include searching a database of locations, and implement...... hiện toàn bộ
#Wearable computers #Computer displays #Wrist #Computer interfaces #Wearable sensors #User interfaces #Speech recognition #Auditory displays #Application software #Visual databases
Quản lý di động trong mạng nhiều lớp dựa trên IP hỗ trợ dịch vụ truyền thông đa phương tiện di động Dịch bởi AI - Trang 347-352
Ying-Hong Wang, Chih-Hsiao Tsai, Hui-Min Huang
Giao tiếp không dây chỉ cung cấp giọng nói là không đủ để đáp ứng nhu cầu của người sử dụng. Đó là một tính năng quan trọng của giao tiếp không dây thế hệ tiếp theo để cung cấp khả năng này thông qua Internet di động. Mobile IP cho phép các thiết bị di động thay đổi vị trí và giảm khả năng mất gói dữ liệu trong các mạng giao tiếp không dây. Tuy nhiên, Mobile IP vẫn còn một số thiếu sót trong các k...... hiện toàn bộ
#Quản lý di động trong radio di động #Giao tiếp đa phương tiện #Giao tiếp di động #Giao tiếp không dây #Internet #Giao thức định tuyến #Kiểm soát hệ thống giao tiếp #Chất lượng dịch vụ #Chuyển mạch gói #Chuyển mạch giao tiếp
An efficient and flexible access control framework for Java programs in mobile terminals - Trang 777-782
H. Tomimori, Y. Nakamoto
The current Java Application Environment for mobile terminals provides a very restricted security mechanism which is known as "the sandbox model." Although 3rd Generation Partnership Project defines access control and permission framework of a Java program in the terminal as the security domain, the specification has problems such that implementation in the terminal becomes difficult because it re...... hiện toàn bộ
#Access control #Java #Authentication #Information security #Permission #Trademarks #Virtual machining #Intelligent networks #National electric code #Home appliances
Distributing objects with multiple aspects - Trang 459-464
H. Mili, H. Mcheick, S. Sadou
The separation of concerns, as a conceptual tool, enables us to manage the complexity of the software systems that we develop. Such was the intent behind the OORAM. When the idea is taken further to software packaging, greater reuse and maintainability are achieved. There have been a number of approaches aimed at modularizing software around the natural boundaries of the various concerns, includin...... hiện toàn bộ
#Runtime #Software development management #Software systems #Software maintenance #Software packages #Packaging #Application software #Context-aware services #Permission #Quality of service
Multimedia customisation using an event notification protocol - Trang 549-554
R. Robinson, A. Rakotonirainy
Online personalisation is of great interest to companies. Event notification systems are becoming more and more popular as a natural candidate to provide personalised services. Although event notification protocols do not immediately spring to mind as the most sensible transport of realtime streams, our approach does utilise a content-based event notification protocol. In this paper we present an ...... hiện toàn bộ
#Streaming media #TV #Transport protocols #Computer displays #Subscriptions #Feeds #Information technology #Australia #Filters #Information resources
A flexible, privacy-preserving authentication framework for ubiquitous computing environments - Trang 771-776
J. Al-Muhtadi, A. Ranganathan, R. Campbell, M.D. Mickunas
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical spaces into "Active Information Spaces" augmented with intelligence and enhanced with services. This new exciting computing paradigm promises to revolutionize the way we interact with computers, services, and the surroundi...... hiện toàn bộ
#Authentication #Ubiquitous computing #Pervasive computing #Physics computing #Intelligent sensors #Home appliances #Mobile computing #Personal digital assistants #Productivity #Access control
An efficient method to improve the quality of watermarked cover image - Trang 267-271
Wen-Shyong Hsieh, Chuan-Fu Wu, Jen-Yi Huang, Jyh-Long Lin, Buh-Yun Sher
In this paper, a general concept called the n+k/n method is introduced. In the n+k/n method, a special mapping function is defined to map an intermediate set with n+k bits into a n bit information set. In the embedding process, the intermediate set is embedded into a cover image rather than embedding the information set. If the distance between features of the cover image and the bits of the inter...... hiện toàn bộ
#Watermarking #Internet #Image quality #Data mining #Military computing #Information security #Computer science #Laboratories #Telecommunication computing #Military communication
Mobile agent model for distributed systems - Trang 131-136
T. Komiya, H. Ohsida, M. Takizawa
Application programs on application servers issue requests to object servers in traditional database systems. On the other hand, programs named agents move around object servers whose objects are manipulated objects in a mobile agent approach. If an agent conflicts with other agents on an object server, the agents negotiate with each other to resolve the confliction. An agent moves to another serv...... hiện toàn bộ
#Mobile agents #Network servers #Application software #Robustness #Databases #Access protocols #Counting circuits #Checkpointing #Fault tolerance #Telecommunication network reliability
Quantifying effect of network latency and clock drift on time-driven key sequencing - Trang 35-42
G.G. Xie, C. Irvine, T. Levin
Time-driven key sequencing (TKS) is a key management technique that synchronizes the session key used by a set of communicating principals based on time of day. This relatively low cost method of session key synchronization has been used in specialized distributed systems with low-end communicating devices where sessions are sparse and each session spans a short time period comprising a small numb...... hiện toàn bộ
#Delay #Clocks #Synchronization #Cryptography #Data security #Costs #Smart cards #Computer science #Computer network management #Computer networks
Taxonomy of distributed event-based programming systems - Trang 585-586
R. Meier, V. Cahill
This paper presents a survey of existing event systems structured as a taxonomy of distributed event-based programming systems. Our taxonomy identifies a set of fundamental properties of event-based programming systems and categorizes them according to the event model and event service criteria. The event service is further classified according to its organization and interaction model, as well as...... hiện toàn bộ
#Taxonomy #Programming profession #Brain modeling #Middleware #Computer science #Educational institutions #Finance #Multimedia systems #Aerospace electronics #Medical services