Sciweavers

7426 search results - page 126 / 1486
» The LHC Computing Challenge
Sort
View
IJNSEC
2006
156views more  IJNSEC 2006»
15 years 4 months ago
Security in Pervasive Computing: Current Status and Open Issues
Million of wireless device users are ever on the move, becoming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing...
Munirul M. Haque, Sheikh Iqbal Ahamed
INFOCOM
2010
IEEE
15 years 3 months ago
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
—Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this para...
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou
DIALM
1999
ACM
150views Algorithms» more  DIALM 1999»
15 years 8 months ago
Mobile computing in next generation wireless networks
In this paper, we attempt to describe the evolving status of wireless communications and its impact on the future of mobile computing. We present a historical perspective and eluc...
Prathima Agrawal, David Famolari
172
Voted
AC
2008
Springer
15 years 4 months ago
Computing with RFID- Drivers, Technology and Implications
Radio Frequency Identification or simply rfid has come to be an integral part of modern computing. Rfid is notable in that it is the first practical technology to tightly couple p...
George Roussos
BIODATAMINING
2008
120views more  BIODATAMINING 2008»
15 years 4 months ago
Filling the gap between biology and computer science
This editorial introduces BioData Mining, a new journal which publishes research articles related to advances in computational methods and techniques for the extraction of useful ...
Jesús S. Aguilar-Ruiz, Jason H. Moore, Mary...