Sciweavers

5344 search results - page 883 / 1069
» Privacy-Preserving Set Operations
Sort
View
140
Voted
IWQOS
2004
Springer
15 years 9 months ago
Yaksha: a self-tuning controller for managing the performance of 3-tiered Web sites
— Managing the performance of multiple-tiered Web sites under high client loads is a critical problem with the advent of dynamic content and database-driven servers on the Intern...
Abhinav Kamra, Vishal Misra, Erich M. Nahum
134
Voted
HICSS
2003
IEEE
101views Biometrics» more  HICSS 2003»
15 years 9 months ago
Omnisphere: a Personal Communication Environment
Small ubiquitous devices connected by wireless networks will become future Internet appliances. To support them, communication networks must evolve to seamlessly assist appliances...
Franck Rousseau, Justinian Oprescu, Laurentiu-Sori...
159
Voted
ICMENS
2003
IEEE
153views Hardware» more  ICMENS 2003»
15 years 9 months ago
Biologically Inspired Intelligent Robots Using Artificial Muscles
Humans throughout history have always sought to mimic the appearance, mobility, functionality, intelligent operation, and thinking process of biological creatures. This field of b...
Yoseph Bar-Cohen
139
Voted
CASES
2003
ACM
15 years 9 months ago
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis
Recent research in sensor networks has raised issues of security for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices...
Ramnath Venugopalan, Prasanth Ganesan, Pushkin Ped...
137
Voted
DIALM
2003
ACM
113views Algorithms» more  DIALM 2003»
15 years 9 months ago
Multicast time maximization in energy constrained wireless networks
We consider the problem of maximizing the lifetime of a given multicast connection in a wireless network of energyconstrained (e.g. battery-operated) nodes, by choosing ideal tran...
Patrik Floréen, Petteri Kaski, Jukka Kohone...