Sciweavers

7059 search results - page 1278 / 1412
» Bayesian network management
Sort
View
SPC
2005
Springer
14 years 2 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...
WAC
2005
Springer
123views Communications» more  WAC 2005»
14 years 2 months ago
Service Evolution in a Nomadic Wireless Environment
Abstract. In this paper, we present and analyze a framework for selfevolving autonomic services in a wireless nomadic environment. We present a disconnected network architecture, w...
Iacopo Carreras, Francesco De Pellegrini, Daniele ...
WINE
2005
Springer
109views Economy» more  WINE 2005»
14 years 2 months ago
New Algorithms for Mining the Reputation of Participants of Online Auctions
The assessment of credibility and reputation of contractors in online auctions is the key issue in providing reliable environment for customer-to-customer e-commerce. Confident re...
Mikolaj Morzy
ASPLOS
2004
ACM
14 years 2 months ago
D-SPTF: decentralized request distribution in brick-based storage systems
Distributed Shortest-Positioning Time First (D-SPTF) is a request distribution protocol for decentralized systems of storage servers. D-SPTF exploits high-speed interconnects to d...
Christopher R. Lumb, Richard A. Golding
ISLPED
2004
ACM
159views Hardware» more  ISLPED 2004»
14 years 2 months ago
Dynamic voltage scaling for systemwide energy minimization in real-time embedded systems
Traditionally, dynamic voltage scaling (DVS) techniques have focused on minimizing the processorenergy consumption as opposed to the entire system energy consumption. The slowdown...
Ravindra Jejurikar, Rajesh K. Gupta
« Prev « First page 1278 / 1412 Last » Next »