Sciweavers

443 search results - page 45 / 89
» Deploying research technology in the home
Sort
View
EUROSYS
2008
ACM
14 years 5 months ago
Towards cinematic internet video-on-demand
Video-on-demand (VoD) is increasingly popular with Internet users. It gives users greater choice and more control than live streaming or file downloading. Systems such as MSN Vid...
Bin Cheng, Lex Stein, Hai Jin, Zheng Zhang
LOCA
2007
Springer
14 years 2 months ago
Scalable Recognition of Daily Activities with Wearable Sensors
Abstract. High-level and longer-term activity recognition has great potentials in areas such as medical diagnosis and human behavior modeling. So far however, activity recognition ...
Tâm Huynh, Ulf Blanke, Bernt Schiele
NBIS
2009
Springer
14 years 1 months ago
A Security Framework for JXTA-Overlay
At present time, the maturity of P2P research field has pushed through new problems such us those related with security. For that reason, security starts to become one of the key...
Joan Arnedo-Moreno, Keita Matsuo, Leonard Barolli,...
ACMSE
2008
ACM
13 years 10 months ago
A distributed firewall and active response architecture providing preemptive protection
Firewalls provide very good network security features. However, classical perimeter firewall deployments suffer from limitations due to complex network topologies and the inabilit...
J. Lane Thames, Randal Abler, David Keeling
DAGSTUHL
2003
13 years 10 months ago
Policies: Giving Users Control over Calls
Abstract. Features provide extensions to a basic service, but in new systems users require much greater flexibility oriented towards their needs. Traditional features do not easil...
Stephan Reiff-Marganiec