Sciweavers

807 search results - page 68 / 162
» Deploying and evaluating a location-aware system
Sort
View
IPPS
2007
IEEE
14 years 4 months ago
Challenges in Executing Data Intensive Biometric Workloads on a Desktop Grid
Desktop grids have traditionally focused on executing computation intensive workloads. Can they also be used to execute data-intensive workloads? To answer this question, we prese...
Christopher Moretti, Timothy C. Faltemier, Douglas...
CCS
2011
ACM
12 years 10 months ago
Automated black-box detection of side-channel vulnerabilities in web applications
Web applications divide their state between the client and the server. The frequent and highly dynamic client-server communication that is characteristic of modern web application...
Peter Chapman, David Evans
ICC
2011
IEEE
206views Communications» more  ICC 2011»
12 years 9 months ago
Unveiling the Content-Centric Features of TCP
—Content-centric networking has been proposed as a new networking paradigm that is centered around the distribution of content. A key idea of content-centric networks is to addre...
Suman Srinivasan, Ivica Rimac, Volker Hilt, Moritz...
COMSNETS
2012
222views more  COMSNETS 2012»
12 years 5 months ago
Assessing the veracity of identity assertions via OSNs
Anonymity is one of the main virtues of the Internet, as it protects privacy and enables users to express opinions more freely. However, anonymity hinders the assessment of the ve...
Michael Sirivianos, Kyungbaek Kim, Jian Wei Gan, X...
AAAI
2012
12 years 10 days ago
Non-Intrusive Load Monitoring Using Prior Models of General Appliance Types
Non-intrusive appliance load monitoring is the process of disaggregating a household’s total electricity consumption into its contributing appliances. In this paper we propose a...
Oliver Parson, Siddhartha Ghosh, Mark Weal, Alex R...