Sciweavers

1545 search results - page 296 / 309
» Opportunities in Opportunistic Computing
Sort
View
MICRO
2003
IEEE
125views Hardware» more  MICRO 2003»
14 years 3 months ago
WaveScalar
Silicon technology will continue to provide an exponential increase in the availability of raw transistors. Effectively translating this resource into application performance, how...
Steven Swanson, Ken Michelson, Andrew Schwerin, Ma...
P2P
2003
IEEE
157views Communications» more  P2P 2003»
14 years 3 months ago
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems
Decentralized Peer to Peer (P2P) networks offer both opportunities and threats. Its open and decentralized nature makes it extremely susceptible to malicious users spreading harmf...
Aameek Singh, Ling Liu
SENSYS
2003
ACM
14 years 3 months ago
Matching data dissemination algorithms to application requirements
A distinguishing characteristic of wireless sensor networks is the opportunity to exploit characteristics of the application at lower layers. This approach is encouraged by device...
John S. Heidemann, Fabio Silva, Deborah Estrin
SIGUCCS
2003
ACM
14 years 3 months ago
A simple web content management tool as the solution to a web site redesign
Before embarking upon a large web site project, whether creating a new site or just redesigning one, it is generally accepted practice not to begin work until all the problem spec...
David Thomas Dudek, Heidi A. Wieczorek
ADC
2003
Springer
182views Database» more  ADC 2003»
14 years 3 months ago
CT-ITL : Efficient Frequent Item Set Mining Using a Compressed Prefix Tree with Pattern Growth
Discovering association rules that identify relationships among sets of items is an important problem in data mining. Finding frequent item sets is computationally the most expens...
Yudho Giri Sucahyo, Raj P. Gopalan