Sciweavers

11594 search results - page 2202 / 2319
» Cooperation in Service Systems
Sort
View
ACNS
2011
Springer
244views Cryptology» more  ACNS 2011»
13 years 15 days ago
Quantitatively Analyzing Stealthy Communication Channels
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Patrick Butler, Kui Xu, Danfeng (Daphne) Yao
AINA
2011
IEEE
13 years 15 days ago
Auctions for Secure Multi-party Policy Negotiation in Ambient Intelligence
—The advent of distributed and ad-hoc-connected systems such as in Ambient Intelligence applications confronts developers with the question on how to specify QoS- and security po...
Julian Schütte, Stephan Heuser
ALGORITHMICA
2011
13 years 15 days ago
Average Rate Speed Scaling
Speed scaling is a power management technique that involves dynamically changing the speed of a processor. This gives rise to dual-objective scheduling problems, where the operati...
Nikhil Bansal, David P. Bunde, Ho-Leung Chan, Kirk...
MOBISYS
2011
ACM
12 years 11 months ago
Opportunistic alignment of advertisement delivery with cellular basestation overloads
This paper is motivated by two observations: (1) cellular network operators are actively exploring advertisement delivery as a new means of revenue generation, and (2) cellular ba...
Ravi Kokku, Rajesh Mahindra, Sampath Rangarajan, H...
ICCV
2011
IEEE
12 years 9 months ago
Predicting Occupation via Human Clothing and Contexts
Predicting human occupations in photos has great application potentials in intelligent services and systems. However, using traditional classification methods cannot reliably dis...
Zheng Song, Meng Wang, Xian-Sheng Hua, Shuicheng Y...
« Prev « First page 2202 / 2319 Last » Next »