Sciweavers

15251 search results - page 2720 / 3051
» Network Science - Theory and Application
Sort
View
EWSN
2010
Springer
16 years 1 months ago
Phoenix: An Epidemic Approach to Time Reconstruction
Abstract. Harsh deployment environments and uncertain run-time conditions create numerous challenges for postmortem time reconstruction methods. For example, motes often reboot and...
Jayant Gupchup, Douglas Carlson, Razvan Musaloiu-E...
143
Voted
VEE
2010
ACM
291views Virtualization» more  VEE 2010»
15 years 11 months ago
Neon: system support for derived data management
Modern organizations face increasingly complex information management requirements. A combination of commercial needs, legal liability and regulatory imperatives has created a pat...
Qing Zhang, John McCullough, Justin Ma, Nabil Sche...
143
Voted
SAC
2010
ACM
15 years 11 months ago
Trustworthy interaction balancing in mixed service-oriented systems
Web-based collaboration systems typically require dynamic and context-based interactions between people and services. To support such complex interaction scenarios, we introduce a...
Florian Skopik, Daniel Schall, Schahram Dustdar
AINA
2009
IEEE
15 years 11 months ago
Toward fMRI Group Identification Based on Brain Lateralization
— This research presents a novel application of Lateralization Index (LI) in support of a decision making process for the classification of subjects based on their brain activati...
Magno R. Guillen, Malek Adjouadi, Xiaozhen You, Ar...
CCS
2009
ACM
15 years 11 months ago
Can they hear me now?: a security analysis of law enforcement wiretaps
Although modern communications services are susceptible to third-party eavesdropping via a wide range of possible techniques, law enforcement agencies in the US and other countrie...
Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark...
« Prev « First page 2720 / 3051 Last » Next »