Sciweavers

1917 search results - page 87 / 384
» User Model and Utility Based Power Management
Sort
View
GECCO
2007
Springer
170views Optimization» more  GECCO 2007»
15 years 7 months ago
An evolutionary keystroke authentication based on ellipsoidal hypothesis space
Keystroke authentication is a biometric method utilizing the typing characteristics of users. In this paper, we propose an evolutionary method for stable keystroke authentication....
Jae-Wook Lee, Sung-Soon Choi, Byung Ro Moon
OTM
2007
Springer
15 years 7 months ago
Trust Management Model and Architecture for Context-Aware Service Platforms
The entities participating in a context-aware service platform need to establish and manage trust relationships in order to assert different trust aspects including identity provis...
Ricardo Neisse, Maarten Wegdam, Marten van Sindere...
IC
2010
14 years 11 months ago
Cloud Computing - The Next Revolution in Information Technology
: Computing is being transformed to a model consisting of services that are commoditised and delivered in a manner similar to utilities such as water, electricity, gas, and telepho...
Rajkumar Buyya
INFOCOM
2007
IEEE
15 years 8 months ago
Distributed Scheduling and Active Queue Management in Wireless Networks
—We propose a distributed scheduling and active queue management mechanism for wireless ad hoc networks. The approach is based on a random access scheduler where the transmission...
Peter Marbach
CORR
2010
Springer
157views Education» more  CORR 2010»
15 years 1 months ago
Context Ontology Implementation for Smart Home
Context awareness is one of the important fields in ubiquitous computing. Smart Home, a specific instance of ubiquitous computing, provides every family with opportunities to enjo...
Tam Van Nguyen, Wontaek Lim, Huy Anh Nguyen, Deokj...