Sciweavers

1269 search results - page 242 / 254
» Mobile Commerce: Framework, Applications and Networking Supp...
Sort
View
KDD
1999
ACM
128views Data Mining» more  KDD 1999»
13 years 11 months ago
Towards Automated Synthesis of Data Mining Programs
Code synthesis is routinely used in industry to generate GUIs, form lling applications, and database support code and is even used with COBOL. In this paper we consider the questi...
Wray L. Buntine, Bernd Fischer 0002, Thomas Pressb...
SC
1995
ACM
13 years 11 months ago
Multicast Virtual Topologies for Collective Communication in MPCs and ATM Clusters
This paper de nes and describes the properties of a multicast virtual topology, the M-array, and a resource-ecient variation, the REM-array. It is shown how several collective op...
Yih Huang, Chengchang Huang, Philip K. McKinley
JUCS
2008
149views more  JUCS 2008»
13 years 7 months ago
Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension
: In a secure roaming scenario, a user U travels to a foreign network and communicates with a foreign server V securely so that no one other than U and V can obtain the messages ex...
Guomin Yang, Duncan S. Wong, Xiaotie Deng
PERCOM
2010
ACM
13 years 5 months ago
The co-evolution of taxi drivers and their in-car navigation systems
In the recent years, the massive use of in-car navigation systems has symbolized the emergence of location-based services for wayfinding. This market success creates the opportunit...
Fabien Girardin, Josep Blat
WMCSA
2008
IEEE
14 years 1 months ago
Low-bandwidth VM migration via opportunistic replay
Virtual machine (VM) migration has been proposed as a building block for mobile computing. An important challenge for VM migration is to optimize the transfer of large amounts of ...
Ajay Surie, H. Andrés Lagar-Cavilla, Eyal d...