Sciweavers

8655 search results - page 1621 / 1731
» Challenges for Trusted Computing
Sort
View
KDD
2009
ACM
257views Data Mining» more  KDD 2009»
15 years 4 months ago
Argo: intelligent advertising by mining a user's interest from his photo collections
In this paper, we introduce a system named Argo which provides intelligent advertising made possible from users’ photo collections. Based on the intuition that user-generated ph...
Xin-Jing Wang, Mo Yu, Lei Zhang, Rui Cai, Wei-Ying...
LCTRTS
2009
Springer
15 years 4 months ago
Push-assisted migration of real-time tasks in multi-core processors
Multicores are becoming ubiquitous, not only in general-purpose but also embedded computing. This trend is a reflexion of contemporary embedded applications posing steadily incre...
Abhik Sarkar, Frank Mueller, Harini Ramaprasad, Si...
CEC
2009
IEEE
15 years 4 months ago
What is situated evolution?
—In this paper we discuss the notion of situated evolution. Our treatment includes positioning situated evolution on the map of evolutionary processes in terms of time- and space...
Martijn C. Schut, Evert Haasdijk, A. E. Eiben
GLOBECOM
2009
IEEE
15 years 4 months ago
Peer-to-Peer Single Hop Distributed Hash Tables
Abstract—Efficiently locating information in large-scale distributed systems is a challenging problem to which Peer-to-Peer (P2P) Distributed Hash Tables (DHTs) can provide a hi...
Luiz Rodolpho Monnerat, Cláudio L. Amorim
QSHINE
2009
IEEE
15 years 4 months ago
Supporting VoIP Services in IEEE 802.11e WLANs
Voice over Internet Protocol (VoIP) over Wireless Local Area Network (WLAN) is becoming popular thanks to its cost efficiency. However, it has been a challenge to provide good qual...
Jeonggyun Yu, Munhwan Choi, Daji Qiao, Sunghyun Ch...
« Prev « First page 1621 / 1731 Last » Next »