Sciweavers

865 search results - page 169 / 173
» Modeling environmental effects on directionality in wireless...
Sort
View
CCS
2006
ACM
13 years 11 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
AAAI
2008
13 years 9 months ago
CIGAR: Concurrent and Interleaving Goal and Activity Recognition
In artificial intelligence and pervasive computing research, inferring users' high-level goals from activity sequences is an important task. A major challenge in goal recogni...
Derek Hao Hu, Qiang Yang
HCW
1999
IEEE
13 years 11 months ago
A Unified Resource Scheduling Framework for Heterogeneous Computing Environments
A major challenge in Metacomputing Systems (Computational Grids) is to effectively use their shared resources, such as compute cycles, memory, communication network, and data repo...
Ammar H. Alhusaini, Viktor K. Prasanna, Cauligi S....
INFOCOM
2005
IEEE
14 years 1 months ago
Limiting path exploration in BGP
— Slow convergence in the Internet can be directly attributed to the “path exploration” phenomenon, inherent in all path vector protocols. The root cause for path exploration...
Jaideep Chandrashekar, Zhenhai Duan, Zhi-Li Zhang,...
HICSS
2003
IEEE
168views Biometrics» more  HICSS 2003»
14 years 23 days ago
'Pay-per-use' Concept in Healthcare: A Grounded Theory Perspective
Healthcare organizations worldwide are faced with the growing challenge of introducing structural and technological reforms and cost-effective IT solutions that will transform the...
Abdullah A. Akbar