Sciweavers

10414 search results - page 2038 / 2083
» An efficient algorithm for Co-segmentation
Sort
View
CCS
2010
ACM
13 years 9 months ago
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
Cloud computing, as an emerging computing paradigm, enables users to remotely store their data into a cloud so as to enjoy scalable services on-demand. Especially for small and me...
Guojun Wang, Qin Liu, Jie Wu
SIGCOMM
2010
ACM
13 years 9 months ago
Greening backbone networks: reducing energy consumption by shutting off cables in bundled links
In backbone networks, the line cards that drive the links between neighboring routers consume a large amount of energy. Since these networks are typically overprovisioned, selecti...
Will Fisher, Martin Suchara, Jennifer Rexford
SIGCOMM
2010
ACM
13 years 9 months ago
R3: resilient routing reconfiguration
Network resiliency is crucial to IP network operations. Existing techniques to recover from one or a series of failures do not offer performance predictability and may cause serio...
Ye Wang, Hao Wang, Ajay Mahimkar, Richard Alimi, Y...
SIGMOD
2010
ACM
207views Database» more  SIGMOD 2010»
13 years 9 months ago
Leveraging spatio-temporal redundancy for RFID data cleansing
Radio Frequency Identification (RFID) technologies are used in many applications for data collection. However, raw RFID readings are usually of low quality and may contain many an...
Haiquan Chen, Wei-Shinn Ku, Haixun Wang, Min-Te Su...
HUC
2010
Springer
13 years 9 months ago
ElectriSense: single-point sensing using EMI for electrical event detection and classification in the home
This paper presents ElectriSense, a new solution for automatically detecting and classifying the use of electronic devices in a home from a single point of sensing. ElectriSense r...
Sidhant Gupta, Matthew S. Reynolds, Shwetak N. Pat...
« Prev « First page 2038 / 2083 Last » Next »