Sciweavers

1647 search results - page 307 / 330
» Distributing private data in challenged network environments
Sort
View
144
Voted
JUCS
2006
166views more  JUCS 2006»
15 years 3 months ago
CAMMD: Context-Aware Mobile Medical Devices
: Telemedicine applications on a medical practitioner's mobile device should be context-aware. This can vastly improve the effectiveness of mobile applications and is a step t...
Timothy O'Sullivan, John O'Donoghue, John Herbert,...
150
Voted
KDD
2009
ACM
191views Data Mining» more  KDD 2009»
16 years 4 months ago
Scalable pseudo-likelihood estimation in hybrid random fields
Learning probabilistic graphical models from high-dimensional datasets is a computationally challenging task. In many interesting applications, the domain dimensionality is such a...
Antonino Freno, Edmondo Trentin, Marco Gori
129
Voted
INFOCOM
2000
IEEE
15 years 8 months ago
Experimental QoS Performances of Multimedia Applications
Abstract – To bring QoS to the Internet, several better-thanbest-effort network services have been recently devised with significant efforts. The goal of this paper is to measure...
Phil Wang, Yechiam Yemini, Danilo Florissi, John A...
155
Voted
CLUSTER
2004
IEEE
15 years 3 months ago
Seamless Access to Decentralized Storage Services in Computational Grids via a Virtual File System
This paper describes a novel technique for establishing a virtual file system that allows data to be transferred user-transparently and on-demand across computing and storage serve...
Renato J. O. Figueiredo, Nirav H. Kapadia, Jos&eac...
134
Voted
ICDCN
2010
Springer
15 years 10 months ago
Authenticated Byzantine Generals in Dual Failure Model
Pease et al. introduced the problem of Byzantine Generals (BGP) to study the effects of Byzantine faults in distributed protocols for reliable broadcast. It is well known that BG...
Anuj Gupta, Prasant Gopal, Piyush Bansal, Kannan S...