Sciweavers

24188 search results - page 380 / 4838
» Computing on Encrypted Data
Sort
View
MOBIDE
2010
ACM
15 years 5 months ago
Using data mining to handle missing data in multi-hop sensor network applications
A sensor's data loss or corruption, aka sensor data missing, is a common phenomenon in modern wireless sensor networks. It is more severe for multi-hop sensor network (MSN) a...
Le Gruenwald, Hanqing Yang, Md. Shiblee Sadik, Rah...
CHI
2005
ACM
16 years 5 months ago
A living laboratory for the design and evaluation of ubiquitous computing technologies
We introduce the PlaceLab, a new "living laboratory" for the study of ubiquitous technologies in home settings. The PlaceLab is a tool for researchers developing context...
Stephen S. Intille, Kent Larson, Jennifer Beaudin,...
142
Voted
ICDCSW
2007
IEEE
15 years 11 months ago
Using stream queries to measure communication performance of a parallel computing environment
We have developed a data stream management system that supports declarative stream queries running over high data volumes in a supercomputing environment. To enable specification ...
Erik Zeitler, Tore Risch
161
Voted
NCA
2006
IEEE
15 years 10 months ago
Trust Assessment from Observed Behavior: Toward and Essential Service for Trusted Network Computing
Modern distributed information systems handle increasingly critical data and computation, but there is no systematic way to assess whether a given part of the system can be entrus...
Partha Pratim Pal, Franklin Webber, Michael Atighe...
131
Voted
EUC
2005
Springer
15 years 10 months ago
Middleware Architecture for Context Knowledge Discovery in Ubiquitous Computing
Advanced analysis of data for extracting useful knowledge is the next natural step in the world of ubiquitous computing. So far, most of the ubiquitous systems process knowledge in...
Kim Anh Pham Ngoc, Young-Koo Lee, Sungyoung Lee