Sciweavers

8468 search results - page 1664 / 1694
» The Technology of Data Stashing
Sort
View
74
Voted
DAGSTUHL
2007
14 years 11 months ago
Lifetime Extension of Higher Class UHF RFID Tags using special Power Management Techniques and Energy Harvesting Devices
Abstract. Enhanced RFID tag technology especially in the UHF frequency range provides extended functionality like high operating range and sensing and monitoring capabilities. Such...
Alex Janek, Christian Steger, Josef Preishuber-Pfl...
DMIN
2008
158views Data Mining» more  DMIN 2008»
14 years 11 months ago
Mining User Movement Behavior Patterns in a Mobile Service Environment
Abstract - The rapid advances of wireless and web technologies enable the mobile users to request various kinds of services via mobile devices at anytime and anywhere. To provide t...
Yen-Ssu Chou, Tzung-Shi Chen
FAST
2007
14 years 11 months ago
Architectures for Controller Based CDP
Continuous Data Protection (CDP) is a recent storage technology which enables reverting the state of the storage to previous points in time. We propose four alternative architectu...
Guy Laden, Paula Ta-Shma, Eitan Yaffe, Michael Fac...
NSDI
2010
14 years 11 months ago
Centrifuge: Integrated Lease Management and Partitioning for Cloud Services
: Making cloud services responsive is critical to providing a compelling user experience. Many largescale sites, including LinkedIn, Digg and Facebook, address this need by deployi...
Atul Adya, John Dunagan, Alec Wolman
76
Voted
GIL
2007
14 years 11 months ago
Use of vegetation indices to detect plant diseases
: Today’s agriculture is not only confronted with the production of food and animal food, but also with aspects of environmental protection. In today’s crop production, there i...
Kerstin Gröll, Simone Graeff, Wilhelm Claupei...
« Prev « First page 1664 / 1694 Last » Next »