Sciweavers

6229 search results - page 1030 / 1246
» Models of Computation for Networks on Chip
Sort
View
WWW
2004
ACM
16 years 5 months ago
Propagation of trust and distrust
A (directed) network of people connected by ratings or trust scores, and a model for propagating those trust scores, is a fundamental building block in many of today's most s...
Ramanathan V. Guha, Ravi Kumar, Prabhakar Raghavan...
SIGMOD
2005
ACM
135views Database» more  SIGMOD 2005»
16 years 4 months ago
Mining data streams: a review
The recent advances in hardware and software have enabled the capture of different measurements of data in a wide range of fields. These measurements are generated continuously an...
Mohamed Medhat Gaber, Arkady B. Zaslavsky, Shonali...
MOBISYS
2007
ACM
16 years 4 months ago
Rendezvous-based access control for medical records in the pre-hospital environment
We present rendezvous-based access control for access control in the pre-hospital environment. Rendezvous-based access control is a simple cryptographic access control method that...
Feike W. Dillema, Simone Lupetti
DCC
2002
IEEE
16 years 4 months ago
Compression Techniques for Active Video Content
Conventional digital video playback systems provide only limited user interactivity, mostly in the form of VCRlike controls such as fast forward/backward, slow motion, pause/stop,...
Anindya Neogi, Tzi-cker Chiueh
DSN
2009
IEEE
15 years 11 months ago
Fail-Aware Untrusted Storage
We consider a set of clients collaborating through an online service provider that is subject to attacks, and hence y trusted by the clients. We introduce the abstraction of a fai...
Christian Cachin, Idit Keidar, Alexander Shraer
« Prev « First page 1030 / 1246 Last » Next »