Sciweavers

468 search results - page 68 / 94
» Cryptographic and Computational Challenges in Grid Computing
Sort
View
107
Voted
IPPS
2008
IEEE
15 years 10 months ago
Implementing an industrial-strength academic cyberinfrastructure at Purdue University
Purdue University operates one of the largest cycle recovery systems in existence in academia based on the Condor workload management system. This system represents a valuable and...
Preston M. Smith, Thomas J. Hacker, C. X. Song
AMT
2010
Springer
230views Multimedia» more  AMT 2010»
15 years 3 months ago
Visual Image Browsing and Exploration (Vibe): User Evaluations of Image Search Tasks
One of the fundamental challenges in designing an image retrieval system is choosing a method by which the images that match a given query are presented to the searcher. Traditiona...
Grant Strong, Orland Hoeber, Minglun Gong
208
Voted
LCN
2008
IEEE
15 years 10 months ago
Key management in wireless sensor networks with inter-network sensor roaming
Wireless Sensor Networks (WSNs) have received considerable attention in recent years and opened up new possibilities for various commercial and industrial applications. A WSN cons...
S. Choi, V. Sarangan, S. Trost
114
Voted
DAC
2004
ACM
16 years 4 months ago
Security as a new dimension in embedded system design
The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems. Embedded sys...
Srivaths Ravi, Paul C. Kocher, Ruby B. Lee, Gary M...
116
Voted
ICRA
2008
IEEE
157views Robotics» more  ICRA 2008»
15 years 10 months ago
Impact of workspace decompositions on discrete search leading continuous exploration (DSLX) motion planning
Abstract— We have recently proposed DSLX, a motion planner that significantly reduces the computational time for solving challenging kinodynamic problems by interleaving continu...
Erion Plaku, Lydia E. Kavraki, Moshe Y. Vardi