Sciweavers

132 search results - page 24 / 27
» A Formal Privacy System and Its Application to Location Base...
Sort
View
ICDCS
2009
IEEE
13 years 5 months ago
A Case Study of Traffic Locality in Internet P2P Live Streaming Systems
With the ever-increasing P2P Internet traffic, recently much attention has been paid to the topology mismatch between the P2P overlay and the underlying network due to the large a...
Yao Liu, Lei Guo, Fei Li, Songqing Chen
ICPPW
2005
IEEE
14 years 1 months ago
Matchmaking, Datasets and Physics Analysis
Grid enabled physics analysis requires a Workload Management System (WMS) that takes care of finding suitable computing resources to execute data intensive jobs. A typical exampl...
Heinz Stockinger, Flavia Donno, Giulio Eulisse, Mi...
IDTRUST
2009
ACM
14 years 2 months ago
Usable secure mailing lists with untrusted servers
Mailing lists are a natural technology for supporting messaging in multi-party, cross-domain collaborative tasks. However, whenever sensitive information is exchanged on such list...
Rakeshbabu Bobba, Joe Muggli, Meenal Pant, Jim Bas...
WINET
2010
178views more  WINET 2010»
13 years 2 months ago
Zero-configuration indoor localization over IEEE 802.11 wireless infrastructure
With the technical advances in ubiquitous computing and wireless networking, there has been an increasing need to capture the context information (such as the location) and to figu...
Hyuk Lim, Lu-Chuan Kung, Jennifer C. Hou, Haiyun L...
HICSS
2003
IEEE
250views Biometrics» more  HICSS 2003»
14 years 25 days ago
A Method for Demand-Driven Information Requirements Analysis in Data Warehousing Projects
Information requirements analysis for data warehouse systems differs significantly from requirements analysis for conventional information systems. Existing data warehouse specifi...
Robert Winter, Bernhard Strauch