Sciweavers

343 search results - page 55 / 69
» Social Learning Applications in Resource Constrained Network...
Sort
View
IJSN
2008
145views more  IJSN 2008»
13 years 7 months ago
Clique-based group key assignment in Wireless Sensor Networks
: Security has become the corner stone of research in wireless sensor networks (WSNs). Due to the unique operational environment of WSNs, where the communication medium is open to ...
Avinash Srinivasan, Feng Li, Jie Wu, Minglu Li
CHI
2005
ACM
14 years 8 months ago
NEmESys: neural emotion eliciting system
This paper describes the development of a new model of agent emotion elicitation called Nemesys. It enhances interfaces with emotional and social information. Nemesys is based on ...
Manfred Eckschlager, Regina Bernhaupt, Manfred Tsc...
ICSE
2004
IEEE-ACM
14 years 7 months ago
Extending the Representational State Transfer (REST) Architectural Style for Decentralized Systems
Because it takes time and trust to establish agreement, traditional consensus-based architectural styles cannot safely accommodate resources that change faster than it takes to tr...
Rohit Khare, Richard N. Taylor
EDOC
2008
IEEE
14 years 2 months ago
Facebook Meets the Virtualized Enterprise
: “Web 2.0” and “cloud computing” are revolutionizing the way IT infrastructure is accessed and managed. Web 2.0 technologies such as blogs, wikis and social networking pla...
Roger Curry, Cameron Kiddle, Nayden Markatchev, Ro...
MIDDLEWARE
2007
Springer
14 years 1 months ago
A multi-commodity flow approach to maximising utility in linked market-based grids
In this paper we consider the problem of maximising utility in linked market-driven distributed and Grid systems. In such systems, users submit jobs through brokers who can virtua...
James Broberg, Rajkumar Buyya