Sciweavers

321 search results - page 63 / 65
» A User Level Framework for Ad Hoc Routing
Sort
View
ISCOPE
1999
Springer
13 years 10 months ago
Using Object-Oriented Techniques for Realizing Parallel Architectural Skeletons
The concept of design patterns has recently emerged as a new paradigm in the context of object-oriented design methodology. Similar ideas are being explored in other areas of compu...
Dhrubajyoti Goswami, Ajit Singh, Bruno R. Preiss
WINET
2002
144views more  WINET 2002»
13 years 5 months ago
Exposure in Wireless Sensor Networks: Theory and Practical Solutions
Wireless ad-hoc sensor networks have the potential to provide the missing interface between the physical world and the Internet, thus impacting a large number of users. This conne...
Seapahn Megerian, Farinaz Koushanfar, Gang Qu, Gia...
SIGMOD
2011
ACM
170views Database» more  SIGMOD 2011»
12 years 9 months ago
Warding off the dangers of data corruption with amulet
Occasional corruption of stored data is an unfortunate byproduct of the complexity of modern systems. Hardware errors, software bugs, and mistakes by human administrators can corr...
Nedyalko Borisov, Shivnath Babu, NagaPramod Mandag...
ISMIR
2000
Springer
190views Music» more  ISMIR 2000»
13 years 9 months ago
Music IR: Past, Present, and Future
Music Information Retrieval has a longer history than most people realise, with systems developed in the 1960's. The field has its roots in information retrieval, musicology ...
Alexandra L. Uitdenbogerd
ENTCS
2006
134views more  ENTCS 2006»
13 years 6 months ago
Anonymity in Probabilistic and Nondeterministic Systems
Anonymity means that the identity of the user performing a certain action is maintained secret. The protocols for ensuring anonymity often use random mechanisms which can be descr...
Catuscia Palamidessi