Sciweavers

2275 search results - page 345 / 455
» A Deployment System for Pervasive Computing
Sort
View
DRM
2009
Springer
15 years 10 months ago
Videosurveillance and privacy: covering the two sides of the mirror with DRM
Privacy and security have always been key concerns for individuals. They have also been closely related concepts: in order to increase their perception of security, people sacriï¬...
Juan Ramón Troncoso-Pastoriza, Pedro Comesa...
DIM
2009
ACM
15 years 10 months ago
Mnikr: reputation construction through human trading of distributed social identities
Reputation forms an important part of how we come to trust people in face-to-face interactions, and thus situations involving trust online have come to realize that reputation is ...
Brendan Francis O'Connor, John Linwood Griffin
NOMS
2008
IEEE
181views Communications» more  NOMS 2008»
15 years 10 months ago
Coordinated management of power usage and runtime performance
— With the continued growth of computing power and reduction in physical size of enterprise servers, the need for actively managing electrical power usage in large datacenters is...
Malgorzata Steinder, Ian Whalley, James E. Hanson,...
SRDS
2008
IEEE
15 years 10 months ago
Using Tractable and Realistic Churn Models to Analyze Quiescence Behavior of Distributed Protocols
Large-scale distributed systems are subject to churn, i.e., continuous arrival, departure and failure of processes. Analysis of protocols under churn requires one to use churn mod...
Steven Y. Ko, Imranul Hoque, Indranil Gupta
CBMS
2007
IEEE
15 years 10 months ago
Problem Solving Environment for Medical Image Analysis
The development of Medical Image Analysis (MIA) applications that can successfully be applied in clinical practice is difficult for several reasons, one of them being the large am...
Ketan C. Maheshwari, Sílvia Delgado Olabarr...