Sciweavers

792 search results - page 37 / 159
» A Proposal of the Person-centered Approach for Personal Task...
Sort
View
PERCOM
2007
ACM
14 years 8 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
KDD
2010
ACM
242views Data Mining» more  KDD 2010»
13 years 11 months ago
A scalable two-stage approach for a class of dimensionality reduction techniques
Dimensionality reduction plays an important role in many data mining applications involving high-dimensional data. Many existing dimensionality reduction techniques can be formula...
Liang Sun, Betul Ceran, Jieping Ye
JSAC
2008
202views more  JSAC 2008»
13 years 9 months ago
Cognitive Wireless Mesh Networks with Dynamic Spectrum Access
Wireless Mesh Networks (WMNs) are envisaged to extend Internet access and other networking services in personal, local, campus, and metropolitan areas. Mesh routers (MR) form the c...
Kaushik R. Chowdhury, Ian F. Akyildiz
LCTRTS
2007
Springer
14 years 3 months ago
Frequency-aware energy optimization for real-time periodic and aperiodic tasks
Energy efficiency is an important factor in embedded systems design. We consider an embedded system with a dynamic voltage scaling (DVS) capable processor and its system-wide pow...
Xiliang Zhong, Cheng-Zhong Xu
JECR
2000
114views more  JECR 2000»
13 years 8 months ago
Intelligent Agents Acting as Artificial Employees in an Electronic Market
This paper describes an agent-based electronic market system whose underlying communication and cooperation protocols establish an artificial environment with advanced features. U...
Nikos I. Karacapilidis, Pavlos Moraitis