Sciweavers

468 search results - page 68 / 94
» Cryptographic and Computational Challenges in Grid Computing
Sort
View
IPPS
2008
IEEE
15 years 8 months ago
Implementing an industrial-strength academic cyberinfrastructure at Purdue University
Purdue University operates one of the largest cycle recovery systems in existence in academia based on the Condor workload management system. This system represents a valuable and...
Preston M. Smith, Thomas J. Hacker, C. X. Song
AMT
2010
Springer
230views Multimedia» more  AMT 2010»
15 years 2 months ago
Visual Image Browsing and Exploration (Vibe): User Evaluations of Image Search Tasks
One of the fundamental challenges in designing an image retrieval system is choosing a method by which the images that match a given query are presented to the searcher. Traditiona...
Grant Strong, Orland Hoeber, Minglun Gong
LCN
2008
IEEE
15 years 8 months ago
Key management in wireless sensor networks with inter-network sensor roaming
Wireless Sensor Networks (WSNs) have received considerable attention in recent years and opened up new possibilities for various commercial and industrial applications. A WSN cons...
S. Choi, V. Sarangan, S. Trost
DAC
2004
ACM
16 years 2 months ago
Security as a new dimension in embedded system design
The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems. Embedded sys...
Srivaths Ravi, Paul C. Kocher, Ruby B. Lee, Gary M...
ICRA
2008
IEEE
157views Robotics» more  ICRA 2008»
15 years 8 months ago
Impact of workspace decompositions on discrete search leading continuous exploration (DSLX) motion planning
Abstract— We have recently proposed DSLX, a motion planner that significantly reduces the computational time for solving challenging kinodynamic problems by interleaving continu...
Erion Plaku, Lydia E. Kavraki, Moshe Y. Vardi