Sciweavers

6229 search results - page 1030 / 1246
» Models of Computation for Networks on Chip
Sort
View
WWW
2004
ACM
14 years 11 months ago
Propagation of trust and distrust
A (directed) network of people connected by ratings or trust scores, and a model for propagating those trust scores, is a fundamental building block in many of today's most s...
Ramanathan V. Guha, Ravi Kumar, Prabhakar Raghavan...
SIGMOD
2005
ACM
135views Database» more  SIGMOD 2005»
14 years 11 months ago
Mining data streams: a review
The recent advances in hardware and software have enabled the capture of different measurements of data in a wide range of fields. These measurements are generated continuously an...
Mohamed Medhat Gaber, Arkady B. Zaslavsky, Shonali...
MOBISYS
2007
ACM
14 years 10 months ago
Rendezvous-based access control for medical records in the pre-hospital environment
We present rendezvous-based access control for access control in the pre-hospital environment. Rendezvous-based access control is a simple cryptographic access control method that...
Feike W. Dillema, Simone Lupetti
DCC
2002
IEEE
14 years 10 months ago
Compression Techniques for Active Video Content
Conventional digital video playback systems provide only limited user interactivity, mostly in the form of VCRlike controls such as fast forward/backward, slow motion, pause/stop,...
Anindya Neogi, Tzi-cker Chiueh
DSN
2009
IEEE
14 years 5 months ago
Fail-Aware Untrusted Storage
We consider a set of clients collaborating through an online service provider that is subject to attacks, and hence y trusted by the clients. We introduce the abstraction of a fai...
Christian Cachin, Idit Keidar, Alexander Shraer
« Prev « First page 1030 / 1246 Last » Next »