Sciweavers

94 search results - page 17 / 19
» AQuA: An Adaptive Architecture that Provides Dependable Dist...
Sort
View
CSREASAM
2006
13 years 8 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
PVLDB
2010
166views more  PVLDB 2010»
13 years 5 months ago
Towards Elastic Transactional Cloud Storage with Range Query Support
Cloud storage is an emerging infrastructure that offers Platforms as a Service (PaaS). On such platforms, storage and compute power are adjusted dynamically, and therefore it is i...
Hoang Tam Vo, Chun Chen, Beng Chin Ooi
MOBISYS
2011
ACM
12 years 10 months ago
Odessa: enabling interactive perception applications on mobile devices
Resource constrained mobile devices need to leverage computation on nearby servers to run responsive applications that recognize objects, people, or gestures from real-time video....
Moo-Ryong Ra, Anmol Sheth, Lily B. Mummert, Padman...
IWCMC
2006
ACM
14 years 1 months ago
Voice capacity under quality constraints for IEEE 802.11a based WLANs
The communication of voice over wireless local area networks (WLANs) is influenced by the choice of speech codec, packetization interval and PHY layer bit rates. These choices aï...
Niranjan Shetty, Sayantan Choudhury, Jerry D. Gibs...
IPSN
2004
Springer
14 years 24 days ago
The impact of spatial correlation on routing with compression in wireless sensor networks
The efficacy of data aggregation in sensor networks is a function of the degree of spatial correlation in the sensed phenomenon. While several data aggregation (i.e., routing with...
Sundeep Pattem, Bhaskar Krishnamachari, Ramesh Gov...