Sciweavers

1992 search results - page 321 / 399
» On the (limited) power of non-equivocation
Sort
View
INFOCOM
2011
IEEE
14 years 5 months ago
Secure and practical outsourcing of linear programming in cloud computing
—Cloud Computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsourc...
Cong Wang, Kui Ren, Jia Wang
MOBISYS
2011
ACM
14 years 4 months ago
Security versus energy tradeoffs in host-based mobile malware detection
The rapid growth of mobile malware necessitates the presence of robust malware detectors on mobile devices. However, running malware detectors on mobile devices may drain their ba...
Jeffrey Bickford, H. Andrés Lagar-Cavilla, ...
ASPLOS
2012
ACM
13 years 9 months ago
Clearing the clouds: a study of emerging scale-out workloads on modern hardware
Emerging scale-out workloads require extensive amounts of computational resources. However, data centers using modern server hardware face physical constraints in space and power,...
Michael Ferdman, Almutaz Adileh, Yusuf Onur Ko&cce...
TMC
2012
13 years 4 months ago
Fast Data Collection in Tree-Based Wireless Sensor Networks
—We investigate the following fundamental question—how fast can information be collected from a wireless sensor network organized as tree? To address this, we explore and evalu...
Özlem Durmaz Incel, Amitabha Ghosh, Bhaskar K...
176
Voted

Publication
293views
16 years 11 months ago
Using Archived Data to Generate Transit Performance Measures.
Measuring the performance of a transit system is the first step toward efficient and proactive management. In recent years, the use of performance measures for transportation plan...
R. L. Bertini, A. M. El-Geneidy