Sciweavers

4529 search results - page 889 / 906
» Position Based Cryptography
Sort
View
CACM
2002
106views more  CACM 2002»
13 years 10 months ago
Testing and demonstrating context-aware services with Quake III Arena
Developers of context-aware services, i.e. services that make use of sensory information from the environment of their users, often find testing and demonstrating services to be di...
Markus Bylund, Fredrik Espinoza
CONCURRENCY
2002
230views more  CONCURRENCY 2002»
13 years 10 months ago
Economic models for resource management and scheduling in Grid computing
: The accelerated development in Peer-to-Peer (P2P) and Grid computing has positioned them as promising next generation computing platforms. They enable the creation of Virtual Ent...
Rajkumar Buyya, David Abramson, Jonathan Giddy, He...
CORR
2002
Springer
131views Education» more  CORR 2002»
13 years 10 months ago
A Connection-Centric Survey of Recommender Systems Research
Recommender systems attempt to reduce information overload and retain customers by selecting a subset of items from a universal set based on user preferences. While research in rec...
Saverio Perugini, Marcos André Gonça...
NAR
2000
94views more  NAR 2000»
13 years 10 months ago
INE: a rice genome database with an integrated map view
The Rice Genome Research Program (RGP) launched a large-scale rice genome sequencing in 1998 aimed at decoding all genetic information in rice. A new genome database called INE (I...
Katsumi Sakata, Baltazar A. Antonio, Yoshiyuki Muk...
FOCM
2002
140views more  FOCM 2002»
13 years 10 months ago
Adaptive Wavelet Methods II - Beyond the Elliptic Case
This paper is concerned with the design and analysis of adaptive wavelet methods for systems of operator equations. Its main accomplishment is to extend the range of applicability...
Albert Cohen, Wolfgang Dahmen, Ronald A. DeVore