Indigence 发表于 2025-3-30 09:50:06

Physical/Cyber Objects Management Framework for Multiple-Area Detectable RFIDch can attach on any everyday physical objects. We have designed and implemented two size of RFID systems which have flexible multiple area antennas to support manage users’ physical objects. This paper describes details of Smart-Furoshiki system and its applications.

熔岩 发表于 2025-3-30 15:15:40

http://reply.papertrans.cn/88/8711/871052/871052_52.png

Jacket 发表于 2025-3-30 17:41:07

Community Computing Model Supporting Community Situation Based Strict Cooperation and Conflict Resolnsequently, we propose the community computing model supporting the community situation based cooperation and conflicts resolution. Case studies are also tried to examine the proposed community computing model.

wall-stress 发表于 2025-3-31 00:14:14

http://reply.papertrans.cn/88/8711/871052/871052_54.png

详细目录 发表于 2025-3-31 03:24:14

http://reply.papertrans.cn/88/8711/871052/871052_55.png

描绘 发表于 2025-3-31 06:23:48

A Task Decomposition Scheme for Context Aggregation in Personal Smart Spacemobile smart space. By decomposing and distributing the heavy aggregation operations the processing overhead upon the coordinating device can be minimized while providing equivalent context aggregation capability for applications, but maintaining the total amount of processing of all devices not to be significantly increased.

愤怒历史 发表于 2025-3-31 12:57:04

http://reply.papertrans.cn/88/8711/871052/871052_57.png

构成 发表于 2025-3-31 14:10:09

http://reply.papertrans.cn/88/8711/871052/871052_58.png

幼儿 发表于 2025-3-31 21:09:53

Probabilistic Optimization and Assessment of Voting Strategies for X-by-Wire Systemsem we show how GTEFT can be used to derive the failure probabilities of different fault scenarios for various systems architectures and different voting strategies. Thus the capability of GTEFT to support system development and system assessment is demonstrated.

Wordlist 发表于 2025-3-31 22:56:57

Application of Safety Analyses in Model Driven Developmentges to express safety analyses, and a model transformation chain. Safety analysts can use these tools to annotate the models, analyze the architecture, and recommend system engineers mitigation means to apply for improving the architecture.
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Software Technologies for Embedded and Ubiquitous Systems; 5th IFIP WG 10.2 Int Roman Obermaisser,Yunmook Nah,Franz J. Rammig Conference pr