Sciweavers

1016 search results - page 152 / 204
» Explore or Exploit
Sort
View
COMPSEC
2010
93views more  COMPSEC 2010»
13 years 8 months ago
Roving bugnet: Distributed surveillance threat and mitigation
Abstract Advanced mobile devices such as laptops and smartphones make convenient hiding places for surveillance spyware. They commonly have a microphone and camera built-in, are in...
Ryan Farley, Xinyuan Wang
CONCURRENCY
2008
95views more  CONCURRENCY 2008»
13 years 8 months ago
The File Mover: high-performance data transfer for the grid
The exploration in many scientific disciplines (e.g., High-Energy Physics, Climate Modeling, and Life Sciences) involves the production and the analysis of massive data collection...
Cosimo Anglano, Massimo Canonico
CORR
2010
Springer
175views Education» more  CORR 2010»
13 years 8 months ago
The Dynamics of Vehicular Networks in Urban Environments
Vehicular Ad hoc NETworks (VANETs) have emerged as a platform to support intelligent inter-vehicle communication and improve traffic safety and performance. The road-constrained a...
Nicholas Loulloudes, George Pallis, Marios D. Dika...
CORR
2008
Springer
91views Education» more  CORR 2008»
13 years 8 months ago
Secure Lossless Compression with Side Information
Secure data compression in the presence of side information at both a legitimate receiver and an eavesdropper is explored. A noise-free, limited rate link between the source and th...
Deniz Gündüz, Elza Erkip, H. Vincent Poo...
CORR
2008
Springer
150views Education» more  CORR 2008»
13 years 8 months ago
Enhanced Energy-Aware Feedback Scheduling of Embedded Control Systems
Dynamic voltage scaling (DVS) is one of the most effective techniques for reducing energy consumption in embedded and real-time systems. However, traditional DVS algorithms have in...
Feng Xia, Longhua Ma, Wenhong Zhao, Youxian Sun, J...