Sciweavers

2427 search results - page 485 / 486
» Survivability Computation of Networked Information Systems
Sort
View
SOCIALCOM
2010
13 years 3 months ago
GDC: Group Discovery Using Co-location Traces
Smart phones can collect and share Bluetooth co-location traces to identify ad hoc or semi-permanent social groups. This information, known to group members but otherwise unavailab...
Steve Mardenfeld, Daniel Boston, Susan Juan Pan, Q...
SIGMOD
2009
ACM
180views Database» more  SIGMOD 2009»
14 years 6 months ago
Indexing correlated probabilistic databases
With large amounts of correlated probabilistic data being generated in a wide range of application domains including sensor networks, information extraction, event detection etc.,...
Bhargav Kanagal, Amol Deshpande
NBIS
2009
Springer
14 years 10 days ago
Enhancing Simulation Mode Operation of ospfd
In this paper, we describe our modifications to ospfd, a popular open-source implementation of OSPF routing protocol. The ospfd software can also be run in simulation mode, where...
Weigao Xie, Balaji Polepalli, Mukul Goyal, Hossein...
SWS
2004
ACM
13 years 11 months ago
Trust but verify: authorization for web services
Through web service technology, distributed applications can be built in a exible manner, bringing tremendous power to applications on the web. However, this exibility poses sig...
Christian Skalka, Xiaoyang Sean Wang
CE
2008
122views more  CE 2008»
13 years 5 months ago
Ubiquitous learning website: Scaffold learners by mobile devices with information-aware techniques
The portability and immediate communication properties of mobile devices influence the learning processes in interacting with peers, accessing resources and transferring data. For...
G. D. Chen, C. K. Chang, C. Y. Wang