Sciweavers

542 search results - page 94 / 109
» Active management of multi-service networks
Sort
View
128
Voted
HICSS
1999
IEEE
193views Biometrics» more  HICSS 1999»
15 years 4 months ago
Web-based Access to Distributed High-Performance Geographic Information Systems for Decision Support
A number of applications that use GIS for decision support can potentially be enhanced by the use of high-performance computers, broadband networks and mass data stores. We descri...
Paul D. Coddington, Kenneth A. Hawick, Heath A. Ja...
116
Voted
SIGCOMM
2010
ACM
15 years 20 days ago
On the forwarding capability of mobile handhelds for video streaming over MANETs
Despite the importance of real-world experiments, nearly all ongoing research activities addressing video streaming over MANETs are based on simulation studies. Earlier research s...
Stein Kristiansen, Morten Lindeberg, Daniel Rodr&i...
IJISEC
2007
119views more  IJISEC 2007»
15 years 11 days ago
An incentive compatible reputation mechanism for ubiquitous computing environments
The vision of ubiquitous computing is becoming a reality thanks to the advent of portable devices and the advances in wireless networking technologies. It aims to facilitate user ...
Jinshan Liu, Valérie Issarny
CHI
2010
ACM
15 years 7 months ago
After access: challenges facing mobile-only internet users in the developing world
This study reports results of an ethnographic action research study, exploring mobile-centric internet use. Over the course of 13 weeks, eight women, each a member of a livelihood...
Shikoh Gitau, Gary Marsden, Jonathan Donner
122
Voted
WEBI
2009
Springer
15 years 7 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham