Sciweavers

383 search results - page 65 / 77
» Location Selection for Active Services
Sort
View
CCS
2010
ACM
13 years 10 months ago
In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems
The ability to locate random relays is a key challenge for peer-to-peer (P2P) anonymous communication systems. Earlier attempts like Salsa and AP3 used distributed hash table look...
Qiyan Wang, Prateek Mittal, Nikita Borisov
CORR
2007
Springer
95views Education» more  CORR 2007»
13 years 9 months ago
Scheduling in Data Intensive and Network Aware (DIANA) Grid Environments
In Grids scheduling decisions are often made on the basis of jobs being either data or computation intensive: in data intensive situations jobs may be pushed to the data and in co...
Richard McClatchey, Ashiq Anjum, Heinz Stockinger,...
PERCOM
2006
ACM
14 years 9 months ago
Dialing for Displays: Session Initiation Protocol for Opportunistic Augmentation
Opportunistic augmentation denotes connecting a personal mobile device to another device to gain a transient advantage for the user. For example, a mobile phone user might borrow ...
John J. Barton, Stina Nylander, Fopefolu Folowosel...
HICSS
2008
IEEE
135views Biometrics» more  HICSS 2008»
14 years 4 months ago
Formal Foundation of Workflow Hyperpaths and a Graph Search Algorithm for Workflow Hyperpath Generation
While executing a process, many decisions are taken at its various decision points for selecting paths. There is a need for understanding and analyzing on various paths that emana...
Sinnakkrishnan Perumal, Ambuj Mahanti
IROS
2006
IEEE
104views Robotics» more  IROS 2006»
14 years 3 months ago
Resource Management with RFID Technology in Automatic Warehouse System
— Warehouse operation has become a critical activity in supply chain to outperform competitors on customer service, lead times and costs. However, managers often meet difficulti...
Guidong Liu, Wensheng Yu, Yu Liu