Sciweavers

7741 search results - page 1416 / 1549
» Security in Active Networks
Sort
View
131
Voted
CHI
2005
ACM
16 years 5 months ago
Meeteetse: social well-being through place attachment
This paper introduces Meeteetse, a set of technologies designed to facilitate social well-being through place attachment. Meeteetse builds a connection between individual homes an...
Kynthia Brunette, Matthew Eisenstadt, Erik Pukinsk...
VLDB
2009
ACM
165views Database» more  VLDB 2009»
16 years 4 months ago
Online pairing of VoIP conversations
This paper answers the following question; given a multiplicity of evolving 1-way conversations, can a machine or an algorithm discern the conversational pairs in an online fashio...
Michail Vlachos, Aris Anagnostopoulos, Olivier Ver...
ICSE
2004
IEEE-ACM
16 years 4 months ago
A Framework for Ensuring and Improving Dependability in Highly Distributed Systems
A distributed software system's deployment architecture can have a significant impact on the system's dependability. Dependability is a function of various system paramet...
Sam Malek, Nels Beckman, Marija Mikic-Rakic, Nenad...
WISE
2009
Springer
16 years 1 months ago
Maximizing Utility for Content Delivery Clouds
A content delivery cloud, such as MetaCDN1 , is an integrated overlay that utilizes cloud computing to provide content delivery services to Internet end-users. While it ensures sat...
Al-Mukaddim Khan Pathan, James Broberg, Rajkumar B...
126
Voted
ICCAD
2006
IEEE
152views Hardware» more  ICCAD 2006»
16 years 1 months ago
System-wide energy minimization for real-time tasks: lower bound and approximation
We present a dynamic voltage scaling (DVS) technique that minimizes system-wide energy consumption for both periodic and sporadic tasks. It is known that a system consists of proc...
Xiliang Zhong, Cheng-Zhong Xu
« Prev « First page 1416 / 1549 Last » Next »