Sciweavers

270 search results - page 46 / 54
» Architecture Normalization for Component-based Systems
Sort
View
SIGMOD
2011
ACM
220views Database» more  SIGMOD 2011»
14 years 9 days ago
Zephyr: live migration in shared nothing databases for elastic cloud platforms
Multitenant data infrastructures for large cloud platforms hosting hundreds of thousands of applications face the challenge of serving applications characterized by small data foo...
Aaron J. Elmore, Sudipto Das, Divyakant Agrawal, A...
PERCOM
2004
ACM
15 years 9 months ago
Denial-of-Service Attacks on Battery-powered Mobile Computers
Sleep deprivation attacks are a form of denial of service attack whereby an attacker renders a pervasive computing device inoperable by draining the battery more quickly than it w...
Thomas L. Martin, Michael S. Hsiao, Dong S. Ha, Ja...
72
Voted
COMSWARE
2006
IEEE
15 years 3 months ago
Utilizing network features for privacy violation detection
Privacy, its violations and techniques to circumvent privacy violation have grabbed the centre-stage of both academia and industry in recent months. Corporations worldwide have be...
Jaijit Bhattacharya, Rajanish Dass, Vishal Kapoor,...
77
Voted
ECLIPSE
2006
ACM
15 years 3 months ago
A focused learning environment for Eclipse
The support available in Eclipse to help software developers learn complex APIs and development tools is inadequate; the support is largely passive and the support typically opera...
Izzet Safer, Gail C. Murphy, Julie Waterhouse, Jin...
MM
2004
ACM
145views Multimedia» more  MM 2004»
15 years 2 months ago
Proportional service differentiation in wireless LANs using spacing-based channel occupancy regulation
In this paper, we propose Spacing-based Channel Occupancy Regulation (SCORE) MAC protocol that provides proportional service differentiation in terms of normalized throughput in w...
Qi Xue, Aura Ganz