Sciweavers

5799 search results - page 965 / 1160
» Patterns Generate Architectures
Sort
View
150
Voted
PERCOM
2008
ACM
16 years 3 months ago
HARMONI: Context-aware Filtering of Sensor Data for Continuous Remote Health Monitoring
A promising architecture for remote healthcare monitoring involves the use of a pervasive device (such as a cellular phone), which aggregates data from multiple body-worn medical ...
Iqbal Mohomed, Archan Misra, Maria Ebling, William...
175
Voted
PERCOM
2008
ACM
16 years 3 months ago
Stability and Delay Analysis for Multi-Hop Single-Sink Wireless Sensor Networks
Wireless sensor networks are commonly used to monitor and control the physical world. To provide a meaningful service such as disaster and emergency surveillance, meeting real-tim...
Muhammad Farukh Munir, Arzad Alam Kherani, Fethi F...
MOBISYS
2003
ACM
16 years 3 months ago
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Advances in sensing and tracking technology enable location-based applications but they also create significant privacy risks. Anonymity can provide a high degree of privacy, save...
Marco Gruteser, Dirk Grunwald
111
Voted
ICWS
2009
IEEE
16 years 28 days ago
A Policy-Based Middleware for Web Services SLA Negotiation
Negotiation of Service Level Agreements (SLAs) is very important for maintaining Quality of Service (QoS) of composite Web services-based business processes. The process of negoti...
Farhana H. Zulkernine, Patrick Martin, Chris Cradd...
113
Voted
EUROSYS
2007
ACM
16 years 26 days ago
Container-based operating system virtualization: a scalable, high-performance alternative to hypervisors
Hypervisors, popularized by Xen and VMware, are quickly becoming commodity. They are appropriate for many usage scenarios, but there are scenarios that require system virtualizatio...
Stephen Soltesz, Herbert Pötzl, Marc E. Fiucz...