Sciweavers

2135 search results - page 201 / 427
» Applications and Issues in Pen-Centric Computing
Sort
View
TDSC
2011
13 years 5 months ago
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET
—In this paper, we study leader election in the presence of selfish nodes for intrusion detection in mobile ad hoc networks (MANETs). To balance the resource consumption among a...
Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad De...
IHI
2010
133views Healthcare» more  IHI 2010»
13 years 5 months ago
Heuristic evaluation of persuasive health technologies
Persuasive technologies for promoting physical fitness, good nutrition, and other healthy behaviors have been growing in popularity. Despite their appeal, the evaluation of these ...
Julie A. Kientz, Eun Kyoung Choe, Brennen Birch, R...
HOTOS
1993
IEEE
14 years 2 months ago
Providing Network Video Service to Mobile Clients
Mobile computing and multimedia are two emerging trends in computer systems. One foreseeable application suggested by these two trends is the playback of stored video on both mobi...
Bruce A. Mah, Srinivasan Seshan, Kimberly Keeton, ...
SC
2004
ACM
14 years 3 months ago
A Performance and Scalability Analysis of the BlueGene/L Architecture
This paper is structured as follows. Section 2 gives an architectural description of BlueGene/L. Section 3 analyzes the issue of “computational noise” – the effect that the o...
Kei Davis, Adolfy Hoisie, Greg Johnson, Darren J. ...
HPDC
1998
IEEE
14 years 2 months ago
Adaptive Communication Algorithms for Distributed Heterogeneous Systems
Heterogeneous network-based systems are emerging as attractive computing platforms for HPC applications. This paper discusses fundamental research issues that must be addressed to...
Prashanth B. Bhat, Viktor K. Prasanna, Cauligi S. ...