Sciweavers

856 search results - page 169 / 172
» Location Management in Pervasive Systems
Sort
View
ACMICEC
2007
ACM
115views ECommerce» more  ACMICEC 2007»
14 years 17 days ago
An economic model of portal competition under privacy concerns
Due to inherent privacy concerns, online personalization services such as those offered through toolbars and desktop widgets are characterized by "no-free-disposal" (NFD...
Ramnath K. Chellappa, Raymond G. Sin
DIALM
2007
ACM
131views Algorithms» more  DIALM 2007»
14 years 15 days ago
Dessy: Towards Flexible Mobile Desktop Search
In the near future, mobile devices are expected to have a storage capacity comparable to today's desktop machines. As the amount of infomation grows, conventional search tool...
Eemil Lagerspetz, Tancred Lindholm, Sasu Tarkoma
BTW
2009
Springer
132views Database» more  BTW 2009»
13 years 12 months ago
End-to-End Performance Monitoring of Databases in Distributed Environments
: This demonstration features the IBM DB2 Performance Expert for Linux, Unix and Windows, a high-end database monitoring tool that is capable of end-to-end monitoring in distribute...
Stefanie Scherzinger, H. Karn, T. Steinbach
CCS
2008
ACM
13 years 10 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
ICDCS
2010
IEEE
13 years 10 months ago
Opportunistic Routing for Interactive Traffic in Wireless Networks
Abstract--To take advantage of the broadcast nature of wireless communication, a number of opportunistic routing techniques have recently been proposed. In order to manage the extr...
Tianji Li, Douglas J. Leith, Lili Qiu