Sciweavers

8655 search results - page 309 / 1731
» Challenges for Trusted Computing
Sort
View
121
Voted
CJ
2010
193views more  CJ 2010»
15 years 27 days ago
Energy-Efficient Cloud Computing
Energy efficiency is increasingly important for future information and communication technologies (ICT), because the increased usage of ICT, together with increasing energy costs a...
Andreas Berl, Erol Gelenbe, Marco Di Girolamo, Gio...
124
Voted
SIGCSE
2009
ACM
144views Education» more  SIGCSE 2009»
16 years 4 months ago
A model academic ethics and integrity policy for computer science departments
For decades, US universities and colleges have had policies pertaining to the conduct of their students at the institutional level. These policies are referred to as Academic Inte...
Charles Riedesel, Eric D. Manley, Susan Poser, Jit...
CHI
2004
ACM
16 years 3 months ago
Acquiring in situ training data for context-aware ubiquitous computing applications
Ubiquitous, context-aware computer systems may ultimately enable computer applications that naturally and usefully respond to a user's everyday activity. Although new algorit...
Stephen S. Intille, Ling Bao, Emmanuel Munguia Tap...
132
Voted
RECOMB
2003
Springer
16 years 3 months ago
Optimizing exact genetic linkage computations
Genetic linkage analysis is a challenging application which requires Bayesian networks consisting of thousands of vertices. Consequently, computing the likelihood of data, which i...
Dan Geiger, Maáyan Fishelson
PERCOM
2005
ACM
16 years 3 months ago
A Capability-Based Privacy-Preserving Scheme for Pervasive Computing Environments
Pervasive computing is a future technology that provides a user with the capability to compute and communicate from everywhere. In a pervasive computing environment, a user interac...
Divyan M. Konidala, Dang Nguyen Duc, Dongman Lee, ...