Sciweavers

24529 search results - page 4899 / 4906
» Computing on Authenticated Data
Sort
View
INFOCOM
2011
IEEE
13 years 1 months ago
Finite-horizon energy allocation and routing scheme in rechargeable sensor networks
Abstract—In this paper, we investigate the problem of maximizing the throughput over a finite-horizon time period for a sensor network with energy replenishment. The finite-horiz...
Shengbo Chen, Prasun Sinha, Ness B. Shroff, Changh...
IPSN
2011
Springer
13 years 1 months ago
Localising speech, footsteps and other sounds using resource-constrained devices
While a number of acoustic localisation systems have been proposed over the last few decades, these have typically either relied on expensive dedicated microphone arrays and works...
Yukang Guo, Mike Hazas
IWQOS
2011
Springer
13 years 21 days ago
Adaptive data-driven service integrity attestation for multi-tenant cloud systems
Abstract—Cloud systems provide a cost-effective service hosting infrastructure for application service providers (ASPs). However, cloud systems are often shared by multiple tenan...
Juan Du, Xiaohui Gu, Nidhi Shah
JSS
2011
114views more  JSS 2011»
13 years 21 days ago
An approach to process continuous location-dependent queries on moving objects with support for location granules
Location-based services have attracted the attention of important research in the field of mobile computing. Specifically, different mechanisms have been proposed to process loc...
Sergio Ilarri, Carlos Bobed, Eduardo Mena
NAR
2011
219views Computer Vision» more  NAR 2011»
13 years 20 days ago
SCLD: a stem cell lineage database for the annotation of cell types and developmental lineages
Stem cell biology has experienced explosive growth over the past decade as researchers attempt to generate therapeutically relevant cell types in the laboratory. Recapitulation of...
Edward Hemphill, Asav P. Dharia, Chih Lee, Carolin...
« Prev « First page 4899 / 4906 Last » Next »