Sciweavers

3544 search results - page 606 / 709
» Information Security in Open Systems
Sort
View
110
Voted
CIKM
2009
Springer
15 years 5 months ago
Packing the most onto your cloud
Parallel dataflow programming frameworks such as Map-Reduce are increasingly being used for large scale data analysis on computing clouds. It is therefore becoming important to a...
Ashraf Aboulnaga, Ziyu Wang, Zi Ye Zhang
HICSS
2008
IEEE
104views Biometrics» more  HICSS 2008»
15 years 5 months ago
Virtual Experiential Marketing on Online Customer Intentions and Loyalty
Advances in information and web technologies have open numerous opportunities for online retailing. The pervasiveness of the Internet coupled with the keenness in competition amon...
Jashen Chen, Russell K. H. Ching, Margaret Meiling...
EUSAI
2007
Springer
15 years 5 months ago
Distributed AI for Ambient Intelligence: Issues and Approaches
Abstract. Research in many fields of AI, such as distributed planning and reasoning, agent teamwork and coalition formation, cooperative problem solving and action theory has adva...
Theodore Patkos, Antonis Bikakis, Grigoris Antonio...
MOBICOM
2006
ACM
15 years 5 months ago
Using packet probes for available bandwidth estimation: a wireless testbed experience
Evaluating available bandwidth estimation methods requires a malleable MAC protocol implementation, precise MAC layer packet timing measurements, and the ability to create control...
Mesut Ali Ergin, Marco Gruteser
WOWMOM
2006
ACM
191views Multimedia» more  WOWMOM 2006»
15 years 5 months ago
Privacy Preserving Trust Authorization Framework Using XACML
: Nowadays many organisations share sensitive services through open network systems and this raises the need for an authorization framework that can interoperate even when the part...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...