Sciweavers

1917 search results - page 190 / 384
» User Model and Utility Based Power Management
Sort
View
DRM
2008
Springer
15 years 3 months ago
RSA-TBOS signcryption with proxy re-encryption
The recent attack on Apple iTunes Digital Rights Management [17] has brought to light the usefulness of proxy re-encryption schemes for Digital Rights Management. It is known that...
Varad Kirtane, C. Pandu Rangan
CHI
2004
ACM
16 years 2 months ago
If not now, when?: the effects of interruption at different moments within task execution
User attention is a scarce resource, and users are susceptible to interruption overload. Systems do not reason about the effects of interrupting a user during a task sequence. In ...
Piotr D. Adamczyk, Brian P. Bailey
WCNC
2010
IEEE
15 years 5 months ago
Hedonic Coalition Formation Games for Secondary Base Station Cooperation in Cognitive Radio Networks
— In order to maintain a conflict-free environment among licensed primary users (PUs) and unlicensed secondary users (SUs) in cognitive radio networks, providing frequency and g...
Walid Saad, Zhu Han, Tamer Basar, Are Hjøru...
ICMCS
1999
IEEE
150views Multimedia» more  ICMCS 1999»
15 years 6 months ago
DIVeR: A Dynamic Interactive Video Retrieval Protocol for Disk Array Based Servers
Video-on-demand (VOD) is a very promising multimedia application of the near future. In order for such a service to be commercially viable, efficient storage and retrieval schemes...
Senthil Sengodan, Victor O. K. Li
FCCM
2005
IEEE
115views VLSI» more  FCCM 2005»
15 years 7 months ago
FIFO Communication Models in Operating Systems for Reconfigurable Computing
Increasing demands upon embedded systems for higher level services like networking, user interfaces and file system management, are driving growth in fully-featured operating syst...
John A. Williams, Neil W. Bergmann, X. Xie