Sciweavers

863 search results - page 166 / 173
» Computational Methods for Intelligent Information Access
Sort
View
DMIN
2008
158views Data Mining» more  DMIN 2008»
15 years 1 months ago
Mining User Movement Behavior Patterns in a Mobile Service Environment
Abstract - The rapid advances of wireless and web technologies enable the mobile users to request various kinds of services via mobile devices at anytime and anywhere. To provide t...
Yen-Ssu Chou, Tzung-Shi Chen
CCGRID
2010
IEEE
15 years 1 days ago
FaReS: Fair Resource Scheduling for VMM-Bypass InfiniBand Devices
In order to address the high performance I/O needs of HPC and enterprise applications, modern interconnection fabrics, such as InfiniBand and more recently, 10GigE, rely on network...
Adit Ranadive, Ada Gavrilovska, Karsten Schwan
CCS
2007
ACM
15 years 6 months ago
Alpaca: extensible authorization for distributed services
Traditional Public Key Infrastructures (PKI) have not lived up to their promise because there are too many ways to define PKIs, too many cryptographic primitives to build them wi...
Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, ...
ICPP
2006
IEEE
15 years 5 months ago
Improving Spatial Reuse with Collision-Aware DCF in Mobile Ad Hoc Networks
—Carrier sensing is a medium access method widely adopted in wireless communication to protect data transfers from interference. For example, Distributed Coordination Function (D...
Lubo Song, Chansu Yu
CBMS
2003
IEEE
15 years 5 months ago
A National Virtual Specimen Database for Early Cancer Detection
Access to biospecimens is essential for enabling cancer biomarker discovery. The National Cancer Institute's (NCI) Early Detection Research Network (EDRN) comprises and integ...
Heather Kincaid, Sean C. Kelly, Daniel J. Crichton...