Sciweavers

478 search results - page 86 / 96
» Secure Sockets Layer
Sort
View
IMC
2010
ACM
13 years 5 months ago
A first look at traffic on smartphones
Using data from 43 users across two platforms, we present a detailed look at smartphone traffic. We find that browsing contributes over half of the traffic, while each of email, me...
Hossein Falaki, Dimitrios Lymberopoulos, Ratul Mah...
AVSS
2009
IEEE
13 years 5 months ago
Counting People in Groups
Abstract--Cameras are becoming a common tool for automated vision purposes due to their low cost. In an era of growing security concerns, camera surveillance systems have become no...
Duc Fehr, Ravishankar Sivalingam, Vassilios Morell...
GCC
2009
Springer
13 years 5 months ago
Interfaces for Placement, Migration, and Monitoring of Virtual Machines in Federated Clouds
Current cloud computing infrastructure offerings are lacking in interoperability, which is a hindrance to the advancement and adoption of the cloud computing paradigm. As clouds ar...
Erik Elmroth, Lars Larsson
CORR
2010
Springer
136views Education» more  CORR 2010»
13 years 4 months ago
Personalized Data Set for Analysis
Data Management portfolio within an organization has seen an upsurge in initiatives for compliance, security, repurposing and storage within and outside the organization. When suc...
Vishal Gupta, Ashutosh Saxena
TDSC
2010
146views more  TDSC 2010»
13 years 2 months ago
Fault Localization via Risk Modeling
Automated, rapid, and effective fault management is a central goal of large operational IP networks. Today's networks suffer from a wide and volatile set of failure modes, wh...
Ramana Rao Kompella, Jennifer Yates, Albert G. Gre...