Sciweavers

3276 search results - page 151 / 656
» Data Management for Pervasive Computing
Sort
View
SRDS
2010
IEEE
15 years 2 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
MM
2004
ACM
149views Multimedia» more  MM 2004»
15 years 10 months ago
Designing experiential environments for management of personal multimedia
With the increasing ubiquity of sensors and computational resources, it is becoming easier and increasingly common for people to electronically record, photographs, text, audio, a...
Rahul Singh, Rachel Knickmeyer, Punit Gupta, Rames...
SPIN
1999
Springer
15 years 8 months ago
Xspin/Project - Integrated Validation Management for Xspin
One of the difficulties of using model checkers “in the large” is the management of all (generated) data during the validation trajectory. It is important that the results obta...
Theo C. Ruys
APNOMS
2007
Springer
15 years 8 months ago
Security Management in Wireless Sensor Networks with a Public Key Based Scheme
This paper proposes an efficient approach for managing the security in WSN. Our approach uses the notion of public key cryptography in which two different keys are used for encrypt...
Al-Sakib Khan Pathan, Jae Hyun Ryu, Md. Mokammel H...
OOPSLA
2009
Springer
15 years 11 months ago
Dependable, online upgrades in enterprise systems
Software upgrades are unreliable, often causing downtime or data loss. I propose Imago, an approach for removing the leading causes of upgrade failures (broken dependencies) and o...
Tudor Dumitras