Sciweavers

1826 search results - page 50 / 366
» Controlling data movement in global computing applications
Sort
View
DAIS
2001
14 years 11 months ago
Sentient Computing for Everyone
: Sentient Computing gives perception to computing systems so that they can detect, interpret and respond to changing aspects of users' context. The location attribute of a us...
Diego López de Ipiña, Sai Lai Lo
SC
2005
ACM
15 years 3 months ago
Identity Boxing: A New Technique for Consistent Global Identity
Today, users of the grid may easily authenticate themselves to computing resources around the world using a public key security infrastructure. However, users are forced to employ...
Douglas Thain
HASE
2008
IEEE
15 years 4 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani
INFOSCALE
2006
ACM
15 years 3 months ago
PENS: an algorithm for density-based clustering in peer-to-peer systems
Huge amounts of data are available in large-scale networks of autonomous data sources dispersed over a wide area. Data mining is an essential technology for obtaining hidden and v...
Mei Li, Guanling Lee, Wang-Chien Lee, Anand Sivasu...
BC
2002
91views more  BC 2002»
14 years 9 months ago
Linear combinations of nonlinear models for predicting human-machine interface forces
ACT This study presents a computational framework that capitalizes on known human neuromechanical characteristics during limb movements in order to predict man-machine interactions...
James L. Patton, Ferdinando A. Mussa-Ivaldi