Sciweavers

2503 search results - page 384 / 501
» Building Computer Network Attacks
Sort
View
CHI
2008
ACM
16 years 1 months ago
Asynchronous remote medical consultation for Ghana
Computer-mediated communication systems can be used to bridge the gap between doctors in underserved regions with local shortages of medical expertise and medical specialists worl...
Rowena Luk, Melissa Ho, Paul M. Aoki
98
Voted
PERCOM
2009
ACM
15 years 8 months ago
HIPS: A Calibration-less Hybrid Indoor Positioning System Using Heterogeneous Sensors
—Positioning is a crucial task in pervasive computing, aimed at estimating the user’s positions to provide location-based services. In this paper, we study an interesting probl...
Vincent Wenchen Zheng, Junhui Zhao, Yongcai Wang, ...
DSN
2007
IEEE
15 years 8 months ago
Measuring Availability in Optimistic Partition-Tolerant Systems with Data Constraints
Replicated systems that run over partitionable environments, can exhibit increased availability if isolated partitions are allowed to optimistically continue their execution indep...
Mikael Asplund, Simin Nadjm-Tehrani, Stefan Beyer,...
CIC
2003
150views Communications» more  CIC 2003»
15 years 2 months ago
Performance Modeling of a Cluster of Workstations
Using off-the-shelf commodity workstations to build a cluster for parallel computing has become a common practice. In studying or designing a cluster of workstations one should ha...
Ahmed M. Mohamed, Lester Lipsky, Reda A. Ammar
CHI
2010
ACM
15 years 15 days ago
Social tagging revamped: supporting the users' need of self-promotion through persuasive techniques
People share pictures online to increase their social presence. However, recent studies have shown that most of the content shared in social networks is not looked at by peers. Pr...
Mauro Cherubini, Alejandro Gutierrez, Rodrigo de O...