Sciweavers

984 search results - page 109 / 197
» Methods of resource management in problem-oriented computing...
Sort
View
SPC
2005
Springer
15 years 9 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...
142
Voted
IPPS
2003
IEEE
15 years 8 months ago
Fast Online Task Placement on FPGAs: Free Space Partitioning and 2D-Hashing
Partial reconfiguration allows for mapping and executing several tasks on an FPGA during runtime. Multitasking on FPGAs raises a number of questions on the management of the reco...
Herbert Walder, Christoph Steiger, Marco Platzner
APNOMS
2008
Springer
15 years 5 months ago
A Logical Group Formation and Management Mechanism Using RSSI for Wireless Sensor Networks
Abstract. Wireless sensor network is a suitable technology for ubiquitous environment. However, in WSN, as the network size grows larger, overheads such as flooding, calculation an...
Jihyuk Heo, Jin Ho Kim, Choong Seon Hong
148
Voted
RTCSA
2007
IEEE
15 years 9 months ago
A Privacy Preserving Access Control Scheme using Anonymous Identification for Ubiquitous Environments
Compared to all emerging issues, privacy is probably the most prominent concern when it comes to judging the effects of a wide spread deployment of ubiquitous computing. On one ha...
Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, He...
142
Voted
ESCIENCE
2006
IEEE
15 years 7 months ago
Grid Services Toolkit for Process Data Processing
Grid is a rapidly growing new technology that will provide easy access to huge amounts of computer resources, both hardware and software. As these resources become available soon,...
Tim O. Müller, Thomas Jejkal, Rainer Stotzka,...