Sciweavers

1897 search results - page 174 / 380
» Early application identification
Sort
View
IFIP
2007
Springer
15 years 11 months ago
Towards a Context Binding Transparency
Context-aware applications use context information, like location or identification of nearby objects of interest, to adapt their behavior to the current situation of the user. The...
Tom Broens, Dick A. C. Quartel, Marten van Sindere...
DIM
2007
ACM
15 years 8 months ago
Using reputation to augment explicit authorization
Online social networks are formed when web applications allow users to contribute to an online community. The explosive growth of these social networks taxes the management capaci...
Phillip J. Windley, Devlin Daley, Bryant Cutler, K...
138
Voted
ECEH
2006
168views Healthcare» more  ECEH 2006»
15 years 6 months ago
Building a Smart Hospital using RFID Technologies
: Technologies of identification by radio frequencies (RFID) experience a fast development and healthcare is predicted to be one of its major growth areas. After briefly introducin...
Patrik Fuhrer, Dominique Guinard
WETICE
2005
IEEE
15 years 10 months ago
Data access optimization on grid systems
— The execution of data intensive grid applications still raises several questions regarding job scheduling, data migration and replication. The optimization techniques applied b...
László Csaba Lorincz, Tamás K...
NSDI
2010
15 years 6 months ago
Crom: Faster Web Browsing Using Speculative Execution
Early web content was expressed statically, making it amenable to straightforward prefetching to reduce userperceived network delay. In contrast, today's rich web application...
James Mickens, Jeremy Elson, Jon Howell, Jay Lorch