Sciweavers

708 search results - page 75 / 142
» Implementing access control to people location information
Sort
View
VLDB
2003
ACM
156views Database» more  VLDB 2003»
14 years 8 months ago
Watermarking relational data: framework, algorithms and analysis
We enunciate the need for watermarking database relations to deter data piracy, identify the characteristics of relational data that pose unique challenges for watermarking, and de...
Rakesh Agrawal, Peter J. Haas, Jerry Kiernan
DOA
2001
94views more  DOA 2001»
13 years 9 months ago
How to Monitor and Control Resource Usage in Mobile Agent Systems
The Mobile Agent technology has already shown its advantages, but at the same time has already remarked new problems currently limiting its diffusion in commercial environments. A...
Paolo Bellavista, Antonio Corradi, Cesare Stefanel...
ASSETS
2010
ACM
13 years 8 months ago
A web-based user survey for evaluating power saving strategies for deaf users of mobileASL
MobileASL is a video compression project for two-way, real-time video communication on cell phones, allowing Deaf people to communicate in the language most accessible to them, Am...
Jessica J. Tran, Tressa W. Johnson, Joy Kim, Rafae...
PUC
2007
164views more  PUC 2007»
13 years 7 months ago
Designing home availability services
Abstract We have explored the challenges of designing domestic services to help family and friends determine mutually agreeable times to call. In our first study, we identified a...
Kristine S. Nagel, Ja-Young Sung, Gregory D. Abowd
ICN
2005
Springer
14 years 1 months ago
Client-Controlled QoS Management in Networked Virtual Environments
In this paper, we propose an architecture to regulate the bandwidth usage of multimedia streams in networked virtual environments. In this architecture, intelligent proxies are pla...
Patrick Monsieurs, Maarten Wijnants, Wim Lamotte