Sciweavers

24529 search results - page 408 / 4906
» Computing on Authenticated Data
Sort
View
KDD
2009
ACM
168views Data Mining» more  KDD 2009»
16 years 5 months ago
Sustainable operation and management of data center chillers using temporal data mining
Motivation: Data centers are a critical component of modern IT infrastructure but are also among the worst environmental offenders through their increasing energy usage and the re...
Debprakash Patnaik, Manish Marwah, Ratnesh K. Shar...
MOBIDE
2010
ACM
15 years 4 months ago
Using data mining to handle missing data in multi-hop sensor network applications
A sensor's data loss or corruption, aka sensor data missing, is a common phenomenon in modern wireless sensor networks. It is more severe for multi-hop sensor network (MSN) a...
Le Gruenwald, Hanqing Yang, Md. Shiblee Sadik, Rah...
CHI
2005
ACM
16 years 5 months ago
A living laboratory for the design and evaluation of ubiquitous computing technologies
We introduce the PlaceLab, a new "living laboratory" for the study of ubiquitous technologies in home settings. The PlaceLab is a tool for researchers developing context...
Stephen S. Intille, Kent Larson, Jennifer Beaudin,...
142
Voted
ICDCSW
2007
IEEE
15 years 11 months ago
Using stream queries to measure communication performance of a parallel computing environment
We have developed a data stream management system that supports declarative stream queries running over high data volumes in a supercomputing environment. To enable specification ...
Erik Zeitler, Tore Risch
NCA
2006
IEEE
15 years 10 months ago
Trust Assessment from Observed Behavior: Toward and Essential Service for Trusted Network Computing
Modern distributed information systems handle increasingly critical data and computation, but there is no systematic way to assess whether a given part of the system can be entrus...
Partha Pratim Pal, Franklin Webber, Michael Atighe...