Sciweavers

1051 search results - page 139 / 211
» Fundamental Challenges in Mobile Computing
Sort
View
CCS
2008
ACM
14 years 6 days ago
Reconsidering physical key secrecy: teleduplication via optical decoding
The access control provided by a physical lock is based on the assumption that the information content of the corresponding key is private -- that duplication should require eithe...
Benjamin Laxton, Kai Wang, Stefan Savage
EUC
2008
Springer
13 years 12 months ago
Privacy Engine for Context-Aware Enterprise Application Services
Satisfying the varied privacy preferences of individuals, while exposing context data to authorized applications and individuals, remains a major challenge for context-aware compu...
Marion Blount, John Davis, Maria Ebling, William F...
RECOMB
2003
Springer
14 years 10 months ago
Designing seeds for similarity search in genomic DNA
Large-scale comparison of genomic DNA is of fundamental importance in annotating functional elements of genomes. To perform large comparisons efficiently, BLAST (Methods: Companio...
Jeremy Buhler, Uri Keich, Yanni Sun
ICS
2010
Tsinghua U.
14 years 7 months ago
Cache Replacement Policies for Multicore Processors
Almost all of the modern computers use multiple cores, and the number of cores is expected to increase as hardware prices go down, and Moore's law fails to hold. Most of the ...
Avinatan Hassidim
ICDCS
2007
IEEE
14 years 4 months ago
Overlay Node Placement: Analysis, Algorithms and Impact on Applications
Abstract— Overlay routing has emerged as a promising approach to improving performance and reliability of Internet paths. To fully realize the potential of overlay routing under ...
Sabyasachi Roy, Himabindu Pucha, Zheng Zhang, Y. C...