Sciweavers

7596 search results - page 148 / 1520
» Challenges in forensic computing
Sort
View
162
Voted
DBSEC
2009
163views Database» more  DBSEC 2009»
15 years 4 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
EOR
2010
88views more  EOR 2010»
15 years 3 months ago
Market-based pricing in grids: On strategic manipulation and computational cost
Grid technologies and the related concepts of utility computing and cloud computing enable the dynamic sourcing of computer resources and services, thus allowing enterprises to cu...
Jochen Stößer, Dirk Neumann, Christof W...
132
Voted
PVLDB
2010
269views more  PVLDB 2010»
15 years 1 months ago
Shortest Path Computation on Air Indexes
Shortest path computation is one of the most common queries in location-based services that involve transportation networks. Motivated by scalability challenges faced in the mobil...
Georgios Kellaris, Kyriakos Mouratidis
135
Voted
ICSE
2003
IEEE-ACM
16 years 3 months ago
A Component Architecture for an Extensible, Highly Integrated Context-Aware Computing Infrastructure
Ubiquitous context-aware computing systems present several challenges in their construction. Principal among them is the tradeoff between easily providing new contextaware service...
William G. Griswold, Robert T. Boyer, Steven W. Br...
127
Voted
MOBISYS
2003
ACM
16 years 3 months ago
Predictive Resource Management for Wearable Computing
Achieving crisp interactive response in resource-intensive applications such as augmented reality, language translation, and speech recognition is a major challenge on resource-po...
Dushyanth Narayanan, Mahadev Satyanarayanan