Sciweavers

3990 search results - page 796 / 798
» The design and applications of a context service
Sort
View
SIGMETRICS
2000
ACM
217views Hardware» more  SIGMETRICS 2000»
13 years 7 months ago
Experimenting with an Ad Hoc wireless network on campus: insights and experiences
Ad hoc wireless networks are new communication networks that can be dynamically formed and deformed onthe- y, anytime and anywhere. User data is routed with the help of an ad hoc ...
Chai-Keong Toh, Richard Chen, Minar Delwar, Donald...
CN
1999
116views more  CN 1999»
13 years 7 months ago
Network-conscious GIF image transmission over the Internet
Traditional image compression techniques seek the smallest possible le size for a given level of image quality. By contrast, network-conscious image compression techniques take in...
Paul D. Amer, Sami Iren, Gul E. Sezen, Phillip T. ...
SIGOPS
2008
170views more  SIGOPS 2008»
13 years 7 months ago
I/O resource management through system call scheduling
A principal challenge in operating system design is controlling system throughput and responsiveness while maximizing resource utilization. Unlike previous attempts in kernel reso...
Silviu S. Craciunas, Christoph M. Kirsch, Harald R...
INFOCOM
2010
IEEE
13 years 6 months ago
Distributed Caching Algorithms for Content Distribution Networks
—The delivery of video content is expected to gain huge momentum, fueled by the popularity of user-generated clips, growth of VoD libraries, and wide-spread deployment of IPTV se...
Sem C. Borst, Varun Gupta, Anwar Walid
TMC
2008
159views more  TMC 2008»
13 years 6 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu