Sciweavers

231 search results - page 37 / 47
» Authentication across heterogeneous networks
Sort
View
WWW
2008
ACM
15 years 10 months ago
Information retrieval and knowledge discovery on the semantic web of traditional chinese medicine
We conduct the first systematical adoption of the Semantic Web solution in the integration, management, and utilization of TCM information and knowledge resources. As the results,...
Zhaohui Wu, Tong Yu, Huajun Chen, Xiaohong Jiang, ...
OSDI
2004
ACM
15 years 10 months ago
Energy-Efficiency and Storage Flexibility in the Blue File System
A fundamental vision driving pervasive computing research is access to personal and shared data anywhere at anytime. In many ways, this vision is close to being realized. Wireless...
Edmund B. Nightingale, Jason Flinn
70
Voted
PERCOM
2006
ACM
15 years 9 months ago
Managing Pervasive Systems using Role-based Obligation Policies
Pervasive systems are complex distributed systems containing heterogeneous and mobile devices, services and applications. Policy-based management is an effective approach for mana...
Chetan Shiva Shankar, Roy H. Campbell
AMR
2005
Springer
140views Multimedia» more  AMR 2005»
15 years 3 months ago
Integrating Media Management Towards Ambient Intelligence
As Consumer Electronics devices get interconnected, the issue of aligning their data management solutions becomes prominent. If we want to deploy comprehensive applications that ar...
Willem Fontijn, Jan Nesvadba, Alexander Sinitsyn
ICNP
1999
IEEE
15 years 1 months ago
Scaling End-to-End Multicast Transports with a Topologically-Sensitive Group Formation Protocol
While the IP unicast service has proven successful, extending end-to-end adaptation to multicast has been a difficult problem. Unlike the unicast case, multicast protocols must su...
Sylvia Ratnasamy, Steven McCanne