Sciweavers

AINA
2007
IEEE
13 years 11 months ago
Optimizing Performance of Web Service Providers
A workflow aggregates the underlying Web Services in a manner consistent with the desired functionality. Since CWS can contain atomic and other CWS they encourage the development ...
Dmytro Dyachuk, Ralph Deters
AINA
2008
IEEE
13 years 11 months ago
Communication Protocols and Message Formats for BLAST Parallelization on Cluster Systems
With the widespread use of BLAST, many parallel versions of BLAST on cluster systems are announced, but little work has been done for the parallel execution in the search for indi...
Hong-Soog Kim, Woo-Hyuk Jang, Dong-Soo Han
AINA
2008
IEEE
13 years 11 months ago
Updated Data Dissemination for Applications with Time Constraints in Mobile Ad Hoc Networks
In our previous work, we proposed few updated data dissemination methods to refresh old replicas efficiently in mobile ad hoc networks. These methods disseminate updated data item...
Takahiro Hara, Sanjay Kumar Madria
MOBIDE
2010
ACM
13 years 11 months ago
Random hyperplane projection using derived dimensions
Konstantinos Georgoulas, Yannis Kotidis
DIMVA
2010
13 years 11 months ago
dAnubis - Dynamic Device Driver Analysis Based on Virtual Machine Introspection
Abstract. In the escalating arms race between malicious code and security tools designed to analyze it, detect it or mitigate its impact, malicious code running inside the operatin...
Matthias Neugschwandtner, Christian Platzer, Paolo...
WISEC
2010
ACM
13 years 11 months ago
Attacks on physical-layer identification
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...
WISEC
2010
ACM
13 years 11 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
MOBIDE
2010
ACM
13 years 11 months ago
A cooperative spatial-aware cache for mobile environments
In many scenarios, particularly in military and emergency response operations, mobile nodes that are in close proximity to each other exhibit a high degree of data affinity. For ex...
Fernando J. Maymi, Manuel Rodriguez-Martinez, Wolf...
MOBIDE
2010
ACM
13 years 11 months ago
Direction-based spatial skylines
Traditional location-based services recommend nearest objects to the user by considering their spatial proximity. However, an object not only has its distance but also has its dir...
Xi Guo, Yoshiharu Ishikawa, Yunjun Gao
MOBIDE
2010
ACM
13 years 11 months ago
Power-aware operator placement and broadcasting of continuous query results
Complex event detection over data streams has become ubiquitous through the widespread use of sensors, wireless connectivity and the wide variety of end-user mobile devices. Typic...
Panayiotis Neophytou, Mohamed A. Sharaf, Panos K. ...