Sciweavers

271 search results - page 53 / 55
» Access control over uncertain data
Sort
View
MOBICOM
2005
ACM
13 years 10 months ago
Self-management in chaotic wireless deployments
Over the past few years, wireless networking technologies have made vast forays into our daily lives. Today, one can find 802.11 hardware and other personal wireless technology e...
Aditya Akella, Glenn Judd, Srinivasan Seshan, Pete...
ISCA
2010
IEEE
192views Hardware» more  ISCA 2010»
13 years 9 months ago
NoHype: virtualized cloud infrastructure without the virtualization
Cloud computing is a disruptive trend that is changing the way we use computers. The key underlying technology in cloud infrastructures is virtualization – so much so that many ...
Eric Keller, Jakub Szefer, Jennifer Rexford, Ruby ...
HICSS
1999
IEEE
115views Biometrics» more  HICSS 1999»
13 years 8 months ago
Focusing on Mobility
In this paper, we motivate the importance of the field of mobile computing and survey current practical and formal approaches. We argue that the existing formalisms are not suffic...
Klaus Bergner, Radu Grosu, Andreas Rausch, Alexand...
VLDB
1999
ACM
140views Database» more  VLDB 1999»
13 years 8 months ago
Distributed Hypertext Resource Discovery Through Examples
We describe the architecture of a hypertext resource discovery system using a relational database. Such a system can answer questions that combine page contents, metadata, and hyp...
Soumen Chakrabarti, Martin van den Berg, Byron Dom
VLDB
1997
ACM
120views Database» more  VLDB 1997»
13 years 8 months ago
A Region Splitting Strategy for Physical Database Design of Multidimensional File Organizations
This paper presents a region splitting strategy for physical database design of multidimensional le organizations. Physical database design is the process of determining the optim...
Jong-Hak Lee, Young-Koo Lee, Kyu-Young Whang, Il-Y...