Sciweavers

18924 search results - page 3777 / 3785
» Conformance of Distributed Systems
Sort
View
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
12 years 11 months ago
Power management of online data-intensive services
Much of the success of the Internet services model can be attributed to the popularity of a class of workloads that we call Online Data-Intensive (OLDI) services. These workloads ...
David Meisner, Christopher M. Sadler, Luiz Andr&ea...
PERCOM
2011
ACM
12 years 11 months ago
RegReS: Adaptively maintaining a target density of regional services in opportunistic vehicular networks
Abstract—Pervasive vehicle-mounted mobile devices are increasingly common, and can be viewed as a large-scale ad hoc network on which collaborative, location-based services can b...
Emmanouil Koukoumidis, Li-Shiuan Peh, Margaret Mar...
CHI
2011
ACM
12 years 11 months ago
PhotoCity: training experts at large-scale image acquisition through a competitive game
Large-scale, ground-level urban imagery has recently developed as an important element of online mapping tools such as Google’s Street View. Such imagery is extremely valuable i...
Kathleen Tuite, Noah Snavely, Dun-yu Hsiao, Nadine...
IPSN
2011
Springer
12 years 11 months ago
SpiderBat: Augmenting wireless sensor networks with distance and angle information
Having access to accurate position information is a key requirement for many wireless sensor network applications. We present the design, implementation and evaluation of SpiderBa...
Georg Oberholzer, Philipp Sommer, Roger Wattenhofe...
JAMIA
2011
68views more  JAMIA 2011»
12 years 10 months ago
A secure protocol for protecting the identity of providers when disclosing data for disease surveillance
Background Providers have been reluctant to disclose patient data for public-health purposes. Even if patient privacy is ensured, the desire to protect provider confidentiality h...
Khaled El Emam, Jun Hu, Jay Mercer, Liam Peyton, M...
« Prev « First page 3777 / 3785 Last » Next »