Sciweavers

1974 search results - page 210 / 395
» A Performance Study of Event Processing Systems
Sort
View
227
Voted
VLDB
2007
ACM
155views Database» more  VLDB 2007»
16 years 4 months ago
Answering Aggregation Queries in a Secure System Model
As more sensitive data is captured in electronic form, security becomes more and more important. Data encryption is the main technique for achieving security. While in the past en...
Tingjian Ge, Stanley B. Zdonik
ISCA
2005
IEEE
101views Hardware» more  ISCA 2005»
15 years 9 months ago
Virtualizing Transactional Memory
Writing concurrent programs is difficult because of the complexity of ensuring proper synchronization. Conventional lock-based synchronization suffers from wellknown limitations, ...
Ravi Rajwar, Maurice Herlihy, Konrad K. Lai
ICSM
2002
IEEE
15 years 9 months ago
A Technique for Dynamic Updating of Java Software
During maintenance, systems are updated to correct faults, improve functionality, and adapt the software to changes in its execution environment. The typical softwareupdate proces...
Alessandro Orso, Anup Rao, Mary Jean Harrold
148
Voted
LCPC
2001
Springer
15 years 8 months ago
A Compilation Framework for Power and Energy Management on Mobile Computers
This paper discusses the potential benefits of applicationspecific power management through remote task execution. Power management is crucial for mobile devices that have to re...
Ulrich Kremer, Jamey Hicks, James M. Rehg
143
Voted
ICIP
2004
IEEE
16 years 5 months ago
Security evaluation for communication-friendly encryption of multimedia
This paper addresses the access control issues unique to multimedia, by using a joint signal processing and cryptographic approach to multimedia encryption. Based on three atomic ...
Yinian Mao, Min Wu