Sciweavers

589 search results - page 116 / 118
» Evaluating mobile phones as risk information providers
Sort
View
DRM
2006
Springer
13 years 11 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
EDBT
2009
ACM
184views Database» more  EDBT 2009»
14 years 2 months ago
Distributed similarity search in high dimensions using locality sensitive hashing
In this paper we consider distributed K-Nearest Neighbor (KNN) search and range query processing in high dimensional data. Our approach is based on Locality Sensitive Hashing (LSH...
Parisa Haghani, Sebastian Michel, Karl Aberer
SENSYS
2005
ACM
14 years 1 months ago
Intelligent light control using sensor networks
Increasing user comfort and reducing operation costs have always been two primary objectives of building operations and control strategies. Current building control strategies are...
Vipul Singhvi, Andreas Krause, Carlos Guestrin, Ja...
APNOMS
2006
Springer
13 years 11 months ago
"P4L": A Four Layers P2P Model for Optimizing Resources Discovery and Localization
Peer-to-Peer systems are based on the concept of resources localization and mutualization in dynamic context. In specific environment such as mobile networks, characterized by high...
Mourad Amad, Ahmed Meddahi
CN
2008
97views more  CN 2008»
13 years 7 months ago
Cooperative content dissemination in multi-channel WLAN hotspots
It is common for hotspots in airports, cafes, and malls to deploy info-stations on their access points to provide local information such as flight schedule, multimedia access, sal...
Ching-Ju Lin, Cheng-Fu Chou