Sciweavers

469 search results - page 43 / 94
» Service Data Objects (SDO)
Sort
View
89
Voted
IEEEARES
2006
IEEE
15 years 9 months ago
Availability Constraints for Avionic Data Buses
— The three traditional objectives of computer security are confidentiality, integrity and availability [8]. Availability can be defined as the prevention of denial of service. C...
Alban Gabillon, Laurent Gallon
MIR
2010
ACM
176views Multimedia» more  MIR 2010»
15 years 10 months ago
Object-based tag propagation for semi-automatic annotation of images
Over the last few years, social network systems have greatly increased users’ involvement in online content creation and annotation. Since such systems usually need to deal with...
Ivan Ivanov, Peter Vajda, Lutz Goldmann, Jong-Seok...
137
Voted
NOMS
2010
IEEE
180views Communications» more  NOMS 2010»
15 years 1 months ago
Exploiting non-dedicated resources for cloud computing
—Popular web services and applications such as Google Apps, DropBox, and Go.Pc introduce a wasteful imbalance of processing resources. Each host operated by a provider serves hun...
Artur Andrzejak, Derrick Kondo, David P. Anderson
184
Voted
ICNP
1998
IEEE
15 years 7 months ago
Applying MSTDM to Packet Voice and Data in Cellular Radio Systems
MSTDM is a variant of the Ethernet protocol that provides quality of service guarantees for voice. This protocol has been applied to LAN's and CATV networks. Cellular network...
Nicholas F. Maxemchuk
131
Voted
CIKM
2009
Springer
15 years 8 months ago
Query processing of massive trajectory data based on mapreduce
With the development of positioning technologies and the boosting deployment of inexpensive location-aware sensors, large volumes of trajectory data have emerged. However, efficie...
Qiang Ma, Bin Yang 0002, Weining Qian, Aoying Zhou