Sciweavers

1546 search results - page 289 / 310
» System Support for Management of Networked Low-Power Sensors
Sort
View
CN
2007
172views more  CN 2007»
13 years 7 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
PERCOM
2010
ACM
13 years 5 months ago
A visual, open-ended approach to prototyping ubiquitous computing applications
By nature, ubiquitous computing applications are intimately intertwined with users' everyday life. This situation is challenging because it requires to make the development of...
Zoé Drey, Charles Consel
CORR
2004
Springer
208views Education» more  CORR 2004»
13 years 7 months ago
Business Intelligence from Web Usage Mining
The rapid e-commerce growth has made both business community and customers face a new situation. Due to intense competition on the one hand and the customer's option to choose...
Ajith Abraham
INFOCOM
1998
IEEE
13 years 12 months ago
Implementing Distributed Packet Fair Queueing in a Scalable Switch Architecture
To support the Internet's explosive growth and expansion into a true integrated services network, there is a need for cost-effective switching technologies that can simultaneo...
Donpaul C. Stephens, Hui Zhang
WWW
2010
ACM
14 years 2 months ago
Atomate it! end-user context-sensitive automation using heterogeneous information sources on the web
The transition of personal information management (PIM) tools off the desktop to the Web presents an opportunity to augment these tools with capabilities provided by the wealth o...
Max Van Kleek, Brennan Moore, David R. Karger, Pau...