Sciweavers

778 search results - page 153 / 156
» From Public Views to Private Views - Correctness-by-Design f...
Sort
View
INFOCOM
2009
IEEE
14 years 2 months ago
Delay-Optimal Opportunistic Scheduling and Approximations: The Log Rule
—This paper considers the design of opportunistic packet schedulers for users sharing a time-varying wireless channel from the performance and the robustness points of view. Firs...
Bilal Sadiq, Seung Jun Baek, Gustavo de Veciana
GRID
2007
Springer
14 years 1 months ago
CIC portal: a collaborative and scalable integration platform for high availability grid operations
— EGEE, along with its sister project LCG, manages the world’s largest Grid production infrastructure which is spreading nowadays over 260 sites in more than 40 countries. Just...
Osman Aidel, Alessandro Cavalli, Hélè...
AVBPA
2005
Springer
312views Biometrics» more  AVBPA 2005»
14 years 27 days ago
Securing Electronic Medical Records Using Biometric Authentication
Abstract. Ensuring the security of medical records is becoming an increasingly important problem as modern technology is integrated into existing medical services. As a consequence...
Stephen Krawczyk, Anil K. Jain
SEMWEB
2005
Springer
14 years 25 days ago
PR-OWL: A Bayesian Ontology Language for the Semantic Web
This paper addresses a major weakness of current technologies for the Semantic Web, namely the lack of a principled means to represent and reason about uncertainty. This not only h...
Paulo Cesar G. da Costa, Kathryn B. Laskey, Kennet...
HICSS
2003
IEEE
186views Biometrics» more  HICSS 2003»
14 years 19 days ago
Personalization through Mask Marketing
Customized marketing, so called 1-to-1 marketing, is often viewed as the panacea of e-commerce. User profiles, such as click streams logging every site the user accesses, are expl...
Moritz Strasser, Alf Zugenmaier