Sciweavers

6168 search results - page 1106 / 1234
» A Scalable Services Architecture
Sort
View
SIGMOD
2007
ACM
105views Database» more  SIGMOD 2007»
16 years 1 months ago
Supporting entity search: a large-scale prototype search engine
As the Web has evolved into a data-rich repository, with the standard "page view," current search engines are increasingly inadequate. While we often search for various ...
Tao Cheng, Xifeng Yan, Kevin Chen-Chuan Chang
PERCOM
2008
ACM
16 years 1 months ago
Stability and Delay Analysis for Multi-Hop Single-Sink Wireless Sensor Networks
Wireless sensor networks are commonly used to monitor and control the physical world. To provide a meaningful service such as disaster and emergency surveillance, meeting real-tim...
Muhammad Farukh Munir, Arzad Alam Kherani, Fethi F...
PERCOM
2005
ACM
16 years 1 months ago
Hybrid Context Model Based on Multilevel Situation Theory and Ontology for Contact Centers
Context awareness and context modeling have raised their call for attention and importance quite recently in the world of contact centers for better customer services and relation...
Anupama Kalyan, Srividya Gopalan, V. Sridhar
ICDE
2010
IEEE
401views Database» more  ICDE 2010»
15 years 10 months ago
Continuous Query Evaluation over Distributed Sensor Networks
— In this paper1 we address the problem of processing continuous multi-join queries, over distributed data streams. Our approach makes use of existing work in the field of publi...
Oana Jurca, Sebastian Michel, Alexandre Herrmann, ...
ICCD
2004
IEEE
97views Hardware» more  ICCD 2004»
15 years 10 months ago
Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution
1 Many computer security threats involve execution of unauthorized foreign code on the victim computer. Viruses, network and email worms, Trojan horses, backdoor programs used in ...
A. Murat Fiskiran, Ruby B. Lee
« Prev « First page 1106 / 1234 Last » Next »