Sciweavers

6574 search results - page 101 / 1315
» Current Signatures: Application
Sort
View
PODC
2011
ACM
14 years 3 months ago
Securing social networks
We present a cryptographic framework to achieve access control, privacy of social relations, secrecy of resources, and anonymity of users in social networks. The main idea is to u...
Michael Backes, Matteo Maffei, Kim Pecina
112
Voted
ESTIMEDIA
2003
Springer
15 years 6 months ago
Run-Time Scheduling for Multimedia Applications on Dynamically Reconfigurable Systems
Current multimedia applications are characterized by highly dynamic and non-deterministic behavior as well as high-performance requirements. In addition, portable devices demand a...
Javier Resano, Diederik Verkest, Daniel Mozos, Ser...
95
Voted
CCECE
2006
IEEE
15 years 6 months ago
A High-Speed Low-Power Rail-to-Rail Buffer Amplifier for LCD Application
A high-speed low-power rail-to-rail class-B buffer amplifier, which is suitable for liquid crystal display applications, is proposed. The summing circuit is biased by the constant...
Chih-Wen Lu, Peter H. Xiao
108
Voted
PERCOM
2009
ACM
16 years 1 months ago
Programmable Presence Virtualization for Next-Generation Context-Based Applications
Abstract--Presence, broadly defined as an event publishnotification infrastructure for converged applications, has emerged as a key mechanism for collecting and disseminating conte...
Arup Acharya, Nilanjan Banerjee, Dipanjan Chakrabo...
102
Voted
ICMAS
2000
15 years 2 months ago
Self-Organizing Manufacturing Control: An Industrial Application of Agent Technology
We present an auction-based approach to manufacturing control. Workpieces auction off their current task, while machines bid for tasks. When awarding a machine, a workpiece takes ...
Stefan Bussmann, Klaus Schild