Sciweavers

708 search results - page 111 / 142
» Implementing access control to people location information
Sort
View
ICDCS
1995
IEEE
13 years 11 months ago
Specifying Weak Sets
nt formal speci cations of a new abstraction, weak sets, which can be used to alleviate high latencies when retrieving data from a wide-area information system like the World Wide...
Jeannette M. Wing, David C. Steere
SIGUCCS
2003
ACM
14 years 28 days ago
How to recruit, motivate and retain effective student workers?
Louisiana State University’s Biomedical Research Center is on a tight state funded budget, as are most state educational institutions. Resources are constantly being exhausted a...
Claire C. Lassalle, Robyn C. Richard
WIMOB
2008
IEEE
14 years 2 months ago
VENETA: Serverless Friend-of-Friend Detection in Mobile Social Networking
—Recently, mobile social software has become an active area of research and development. A multitude of systems have been proposed over the past years that try to follow the succ...
Marco von Arb, Matthias Bader, Michael Kuhn 0002, ...
BROADNETS
2005
IEEE
14 years 1 months ago
Multi layer rules based framework for vertical handoff
— Seamless interoperability between two dissimilar networks require handoff from one network to the other. Such handoffs are known as vertical handoffs. Vertical handoff introduc...
Abhijit Sur, Douglas C. Sicker
PC
2002
189views Management» more  PC 2002»
13 years 7 months ago
Data management and transfer in high-performance computational grid environments
An emerging class of data-intensive applications involve the geographically dispersed extraction of complex scientific information from very large collections of measured or compu...
William E. Allcock, Joseph Bester, John Bresnahan,...