نتایج جستجو برای: assured
تعداد نتایج: 4487 فیلتر نتایج به سال:
A handheld, portable cranial drilling tool for safely creating holes in the skull without damaging brain tissue is presented. Such a device is essential for neurosurgeons and mid-level practitioners treating patients with traumatic brain injury. A typical procedure creates a small hole for inserting sensors to monitor intra-cranial pressure measurements and/or removing excess fluid. Drilling ho...
Many value-added and content delivery services are being offered via service level agreements (SLAs). These services can be interconnected to form a service overlay network (SON) over the Internet. Service composition in SON has emerged as a cost-effective approach to quickly creating new services. Previous research has addressed the reliability, adaptability, and compatibility issues for compo...
Cassava (Manihot esculenta Crantz) is a staple food for more than 500 million people, especially in Africa and South America. However, its consumption bears risks as it contains cyanogenic glycosides that convert enzymatically to toxic cyanide during cell damage. To avoid serious health problems by unintentional cyanide intake, this dangerous product of decomposition must be removed before cons...
In the context of Active Queue Management, intelligent dropping algorithms have been proposed to achieve a better link utilization with TCP. In this paper we apply this research to the problem of achieving a better utilization of a customer’s contracted throughput when it is sending a TCP traffic aggregate. We propose a scheme, Random Early Marking (REM), that improves the throughput of a TCP a...
We introduce the first software-based attestation approach with provable security properties, and argue for its importance as a component in a new Anti-Virus paradigm. Our new method is practical and efficient. It enables detection of any malware (that does not commit suicide to remain undetected) – even if the infection occurred before our security measure was loaded. Our new approach works in...
Pervasive computing applications envision sensor rich computing and networking environments that can capture various types of contexts of inhabitants of the environment, such as their locations, activities, vital signs, and environmental measures. Such context information is useful in a variety of applications, for example to manage health information to promote independent living in “aging-in-...
Previous research work in context quality primarily focuses on identifying and modeling it. However, assuring context quality is no less challenging than modeling it. Difficulties lie in acquiring high-quality context from the context providers whose quality and availability can not be guaranteed. In this paper, we propose a context quality assurance strategy QACA based on the least square erro...
Abstract. Social networks have seen enormous growth over the past few years, providing also a powerful new channel for distributing personalized services. Personalization, however, is exacerbated because social content is scattered across different social networks serving specific human needs and social networkers are particularly reluctant to share social content with service providers, if not...
Ensuring stringent Quality of Service (QoS) requirements is a critical issue in determining the performance of the network. Added to that, when the network happen to be converged Ethernet Passive Optical Network (EPON) and Long Term Evolution (LTE) which is essential for today’s bandwidth-intensive customer needs, it is still more critical. Hence, allocation of resources to the end-points is th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید