Sciweavers

92 search results - page 16 / 19
» Maintaining privacy on derived objects
Sort
View
DATE
2007
IEEE
141views Hardware» more  DATE 2007»
15 years 3 months ago
Energy-efficient real-time task scheduling with task rejection
In the past decade, energy-efficiency has been an important system design issue in both hardware and software managements. For mobile applications with critical missions, both ene...
Jian-Jia Chen, Tei-Wei Kuo, Chia-Lin Yang, Ku-Jei ...
94
Voted
IWCMC
2010
ACM
15 years 1 months ago
Using connection expansion to reduce control traffic in MANETs
We consider the problem of control traffic overhead in MANETs with long-lived connections, operating under a reactive routing protocol (e.g. AODV). In such settings, control traff...
Zeki Bilgin, Bilal Khan, Ala I. Al-Fuqaha
ESWS
2008
Springer
15 years 22 days ago
A Core Ontology for Business Process Analysis
Business Process Management (BPM) aims at supporting the whole life-cycle necessary to deploy and maintain business processes in organisations. An important step of the BPM life-cy...
Carlos Pedrinaci, John Domingue, Ana Karla Alves d...
113
Voted
3DIM
2011
IEEE
13 years 11 months ago
Visual Hull from Imprecise Polyhedral Scene
—We present a framework to compute the visual hull of a polyhedral scene, in which the vertices of the polyhedra are given with some imprecision. Two kinds of visual event surfac...
Peng He, Abbas Edalat
CCS
2009
ACM
16 years 8 days ago
Towards complete node enumeration in a peer-to-peer botnet
Modern advanced botnets may employ a decentralized peer-to-peer overlay network to bootstrap and maintain their command and control channels, making them more resilient to traditi...
Brent ByungHoon Kang, Eric Chan-Tin, Christopher P...