Sciweavers

168 search results - page 27 / 34
» Design and Implementation of a Storage Repository Using Comm...
Sort
View
MOBISYS
2004
ACM
14 years 7 months ago
Metadata Creation System for Mobile Images
The amount of personal digital media is increasing, and managing it has become a pressing problem. Effective management of media content is not possible without content-related me...
Risto Sarvas, Erick Herrarte, Anita Wilhelm, Marc ...
CCS
2004
ACM
14 years 26 days ago
Private inference control
Access control can be used to ensure that database queries pertaining to sensitive information are not answered. This is not enough to prevent users from learning sensitive inform...
David P. Woodruff, Jessica Staddon
VLDB
2002
ACM
108views Database» more  VLDB 2002»
13 years 7 months ago
Energy-performance trade-offs for spatial access methods on memory-resident data
Abstract. The proliferation of mobile and pervasive computing devices has brought energy constraints into the limelight. Energy-conscious design is important at all levels of syste...
Ning An, Sudhanva Gurumurthi, Anand Sivasubramania...
HEURISTICS
2000
127views more  HEURISTICS 2000»
13 years 7 months ago
Fast, Efficient Equipment Placement Heuristics for Broadband Switched or Internet Router Networks
Planning and designing the next generation of IP router or switched broadband networks seems a daunting challenge considering the many complex, interacting factors affecting the p...
Joel W. Gannett
WWW
2003
ACM
14 years 8 months ago
SHOCK: communicating with computational messages and automatic private profiles
A computationally enhanced message contains some embedded programmatic components that are interpreted and executed automatically upon receipt. Unlike ordinary text email or insta...
Rajan M. Lukose, Eytan Adar, Joshua R. Tyler, Caes...