Sciweavers

92 search results - page 16 / 19
» Maintaining privacy on derived objects
Sort
View
119
Voted
DATE
2007
IEEE
141views Hardware» more  DATE 2007»
15 years 7 months ago
Energy-efficient real-time task scheduling with task rejection
In the past decade, energy-efficiency has been an important system design issue in both hardware and software managements. For mobile applications with critical missions, both ene...
Jian-Jia Chen, Tei-Wei Kuo, Chia-Lin Yang, Ku-Jei ...
136
Voted
IWCMC
2010
ACM
15 years 5 months ago
Using connection expansion to reduce control traffic in MANETs
We consider the problem of control traffic overhead in MANETs with long-lived connections, operating under a reactive routing protocol (e.g. AODV). In such settings, control traff...
Zeki Bilgin, Bilal Khan, Ala I. Al-Fuqaha
157
Voted
ESWS
2008
Springer
15 years 4 months ago
A Core Ontology for Business Process Analysis
Business Process Management (BPM) aims at supporting the whole life-cycle necessary to deploy and maintain business processes in organisations. An important step of the BPM life-cy...
Carlos Pedrinaci, John Domingue, Ana Karla Alves d...
155
Voted
3DIM
2011
IEEE
14 years 3 months ago
Visual Hull from Imprecise Polyhedral Scene
—We present a framework to compute the visual hull of a polyhedral scene, in which the vertices of the polyhedra are given with some imprecision. Two kinds of visual event surfac...
Peng He, Abbas Edalat
144
Voted
CCS
2009
ACM
16 years 4 months ago
Towards complete node enumeration in a peer-to-peer botnet
Modern advanced botnets may employ a decentralized peer-to-peer overlay network to bootstrap and maintain their command and control channels, making them more resilient to traditi...
Brent ByungHoon Kang, Eric Chan-Tin, Christopher P...