Sciweavers

391 search results - page 72 / 79
» Protecting Users' Anonymity in Pervasive Computing Environme...
Sort
View
ACMACE
2009
ACM
14 years 3 months ago
Running or gaming
We developed Exertainer, a sensor-enabled, interactive running entertainment system to support advanced exercise applications. We designed Exertainer to be used in urban environme...
Miru Ahn, Sungjun Kwon, Byunglim Park, Kyungmin Ch...

Tutorial
2179views
15 years 8 months ago
Privacy in Location-Based Services: State-of-the-Art and Research Directions
The explosive growth of location-detection devices (e.g., GPS-like devices and handheld devices) along with wireless communications and mobile databases results in realizing locati...
Mohamed F. Mokbel
CCGRID
2007
IEEE
14 years 2 months ago
Reliability Analysis of Self-Healing Network using Discrete-Event Simulation
The number of processors embedded on high performance computing platforms is continuously increasing to accommodate user desire to solve larger and more complex problems. However,...
Thara Angskun, George Bosilca, Graham E. Fagg, Jel...
ACSC
2006
IEEE
14 years 2 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
IDTRUST
2010
ACM
14 years 1 months ago
Federated login to TeraGrid
We present a new federated login capability for the TeraGrid, currently the world’s largest and most comprehensive distributed cyberinfrastructure for open scientific research....
Jim Basney, Terry Fleury, Von Welch