Sciweavers

1221 search results - page 215 / 245
» Adaptation in Adaptable Personal Information Environment
Sort
View
CN
2007
141views more  CN 2007»
13 years 8 months ago
Designing an overload control strategy for secure e-commerce applications
Uncontrolled overload can lead e-commerce applications to considerable revenue losses. For this reason, overload prevention in these applications is a critical issue. In this pape...
Jordi Guitart, David Carrera, Vicenç Beltra...
PPSN
2010
Springer
13 years 7 months ago
Topography-Aware Sensor Deployment Optimization with CMA-ES
Abstract. Wireless Sensor Networks (WSN) have been studied intensively for various applications such as monitoring and surveillance. Sensor deployment is an essential part of WSN, ...
Vahab Akbarzadeh, Albert Hung-Ren Ko, Christian Ga...
WD
2010
13 years 6 months ago
Vicinity resource cartography for delay-tolerant networks: A holistic perspective
In this paper we propose a distributed approach to construct vicinity resource maps at each node in a delaytolerant network. The scheme uses recent encounters to estimate the avail...
Gabriel Sandulescu, Péter Schaffer, Simin N...
TIS
2010
131views Education» more  TIS 2010»
13 years 3 months ago
Cultivating Interaction Ubiquity at Work
: Since the invention of the electronic computer in the 1940s, technological development has resulted in dramatically increased processing power, storage capacity and communication...
Carsten Sørensen
ICCV
2009
IEEE
15 years 1 months ago
Efficient Privacy Preserving Video Surveillance
Widespread use of surveillance cameras in offices and other business establishments, pose a significant threat to the privacy of the employees and visitors. The challenge of int...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...