نتایج جستجو برای: assured

تعداد نتایج: 4487  

2013
Paul M. Loschak Kechao Xiao Hao Pei

A handheld, portable cranial drilling tool for safely creating holes in the skull without damaging brain tissue is presented. Such a device is essential for neurosurgeons and mid-level practitioners treating patients with traumatic brain injury. A typical procedure creates a small hole for inserting sensors to monitor intra-cranial pressure measurements and/or removing excess fluid. Drilling ho...

2003
Xiaohui Gu Klara Nahrstedt Rong N. Chang Christopher Ward

Many value-added and content delivery services are being offered via service level agreements (SLAs). These services can be interconnected to form a service overlay network (SON) over the Internet. Service composition in SON has emerged as a cost-effective approach to quickly creating new services. Previous research has addressed the reliability, adaptability, and compatibility issues for compo...

Journal: :Organic & biomolecular chemistry 2015
Felix Zelder Lucas Tivana

Cassava (Manihot esculenta Crantz) is a staple food for more than 500 million people, especially in Africa and South America. However, its consumption bears risks as it contains cyanogenic glycosides that convert enzymatically to toxic cyanide during cell damage. To avoid serious health problems by unintentional cyanide intake, this dangerous product of decomposition must be removed before cons...

2002
Sandra Tartarelli Albert Banchs

In the context of Active Queue Management, intelligent dropping algorithms have been proposed to achieve a better link utilization with TCP. In this paper we apply this research to the problem of achieving a better utilization of a customer’s contracted throughput when it is sending a TCP traffic aggregate. We propose a scheme, Random Early Marking (REM), that improves the throughput of a TCP a...

2010
Markus Jakobsson

We introduce the first software-based attestation approach with provable security properties, and argue for its importance as a component in a new Anti-Virus paradigm. Our new method is practical and efficient. It enables detection of any malware (that does not commit suicide to remain undetected) – even if the infection occurred before our security measure was loaded. Our new approach works in...

2009
Nirmalya Roy Christine Julien Sajal K. Das

Pervasive computing applications envision sensor rich computing and networking environments that can capture various types of contexts of inhabitants of the environment, such as their locations, activities, vital signs, and environmental measures. Such context information is useful in a variety of applications, for example to manage health information to promote independent living in “aging-in-...

2011
Yuanping Li Ling Feng Tharam Dillon

Previous research work in context quality primarily focuses on identifying and modeling it. However, assuring context quality is no less challenging than modeling it. Difficulties lie in acquiring high-quality context from the context providers whose quality and availability can not be guaranteed. In this paper, we propose a context quality assurance strategy QACA based on the least square erro...

2010
Gerti Kappel Johannes Schönböck Manuel Wimmer Gabriele Anderst-Kotsis Angelika Kusel Birgit Pröll Werner Retschitzegger Wieland Schwinger Roland Wagner Stephan Lechner

Abstract. Social networks have seen enormous growth over the past few years, providing also a powerful new channel for distributing personalized services. Personalization, however, is exacerbated because social content is scattered across different social networks serving specific human needs and social networkers are particularly reluctant to share social content with service providers, if not...

2013
S. RAMYA N. NAGARAJAN B. KAARTHICK

Ensuring stringent Quality of Service (QoS) requirements is a critical issue in determining the performance of the network. Added to that, when the network happen to be converged Ethernet Passive Optical Network (EPON) and Long Term Evolution (LTE) which is essential for today’s bandwidth-intensive customer needs, it is still more critical. Hence, allocation of resources to the end-points is th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید