Sciweavers

3276 search results - page 506 / 656
» Data Management for Pervasive Computing
Sort
View
EUC
2008
Springer
15 years 24 days ago
Privacy Engine for Context-Aware Enterprise Application Services
Satisfying the varied privacy preferences of individuals, while exposing context data to authorized applications and individuals, remains a major challenge for context-aware compu...
Marion Blount, John Davis, Maria Ebling, William F...
CONEXT
2009
ACM
15 years 4 days ago
Macroscope: end-point approach to networked application dependency discovery
Enterprise and data center networks consist of a large number of complex networked applications and services that depend upon each other. For this reason, they are difficult to ma...
Lucian Popa 0002, Byung-Gon Chun, Ion Stoica, Jaid...
80
Voted
ICMCS
2010
IEEE
146views Multimedia» more  ICMCS 2010»
15 years 3 days ago
Privacy-preserving approximation of L1 distance for multimedia applications
Alice and Bob possess sequences x and y respectively and would like to compute the 1 distance, namely x - y 1 under privacy and communication constraints. The privacy constraint r...
Shantanu Rane, Wei Sun, Anthony Vetro
GRID
2006
Springer
14 years 11 months ago
How are Real Grids Used? The Analysis of Four Grid Traces and Its Implications
The Grid computing vision promises to provide the needed platform for a new and more demanding range of applications. For this promise to become true, a number of hurdles, includin...
Alexandru Iosup, Catalin Dumitrescu, Dick H. J. Ep...
DAC
2009
ACM
14 years 8 months ago
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic