Sciweavers

3356 search results - page 311 / 672
» Determining Consensus Numbers
Sort
View
RTCSA
2007
IEEE
15 years 10 months ago
Activity-based Access Control Model to Hospital Information
Hospital work is characterized by the need to manage multiple activities simultaneously, constant local mobility, frequently interruptions, and intense collaboration and communica...
Le Xuan Hung, Sungyoung Lee, Young-Koo Lee, Heejo ...
HICSS
2007
IEEE
134views Biometrics» more  HICSS 2007»
15 years 10 months ago
Modeling Enablers for Successful KM Implementation
Knowledge is recognized as a critical resource to gain and sustain competitive advantage in business. While many organizations are employing knowledge management (KM) initiatives,...
Vittal S. Anantatmula, Shivraj Kanungo
TELETRAFFIC
2007
Springer
15 years 10 months ago
Video-on-Demand Server Selection and Placement
Abstract. Large-scale Video-on-Demand (VoD) systems with high storage and high bandwidth requirements need a substantial amount of resources to store, distribute and transport all ...
Frederic Thouin, Mark Coates
WDAG
2007
Springer
105views Algorithms» more  WDAG 2007»
15 years 10 months ago
Rendezvous of Mobile Agents in Unknown Graphs with Faulty Links
A group of identical mobile agents moving asynchronously among the nodes of an anonymous network have to gather together in a single node of the graph. This problem known as the (a...
Jérémie Chalopin, Shantanu Das, Nico...
ACSAC
2006
IEEE
15 years 10 months ago
PAST: Probabilistic Authentication of Sensor Timestamps
Sensor networks are deployed to monitor the physical environment in public and vulnerable locations. It is not economically viable to house sensors in tamper-resilient enclosures ...
Ashish Gehani, Surendar Chandra