Sciweavers

2372 search results - page 69 / 475
» Probabilistic calling context
Sort
View
SAINT
2007
IEEE
14 years 3 months ago
Privacy Management for Context Transponders
While by now feasible solutions to protect privacy for complex ubiquitous applications are available, very small devices, called context transponders (CTP) still lack resources to...
Michael Fahrmair, Wassiou Sitou, Bernd Spanfelner
PDCAT
2007
Springer
14 years 3 months ago
A Service Provision Model Based on Context Awareness for Ubiquitous Computing
Ubiquitous computing environment has become more popular as a highly open, heterogeneous and service-rich domain, which makes it essential and important for end-users to build a r...
Faqun Jiang, Jintao Li, Zhenmin Zhu
ICDT
2009
ACM
109views Database» more  ICDT 2009»
14 years 9 months ago
TOP-K projection queries for probabilistic business processes
A Business Process (BP) consists of some business activities undertaken by one or more organizations in pursuit of some business goal. Tools for querying and analyzing BP specific...
Daniel Deutch, Tova Milo
MSR
2006
ACM
14 years 3 months ago
A lightweight approach to technical risk estimation via probabilistic impact analysis
An evolutionary development approach is increasingly commonplace in industry but presents increased difficulties in risk management, for both technical and organizational reasons...
Robert J. Walker, Reid Holmes, Ian Hedgeland, Pune...
PODC
1998
ACM
14 years 1 months ago
Probabilistic Byzantine Quorum Systems
ÐIn this paper, we explore techniques to detect Byzantine server failures in asynchronous replicated data services. Our goal is to detect arbitrary failures of data servers in a s...
Dahlia Malkhi, Michael K. Reiter, Avishai Wool, Re...