Sciweavers

287 search results - page 53 / 58
» Audio authentication based on distributed source coding
Sort
View
WIOPT
2010
IEEE
14 years 8 months ago
Lifetime optimization for wireless sensor networks with correlated data gathering
—The nodes in wireless sensor networks often collect correlated measurements. Not taking into account this information redundancy is detrimental to the network lifetime, since co...
Nashat Abughalieh, Yann-Aël Le Borgne, Kris S...
ICSE
2010
IEEE-ACM
14 years 7 months ago
Syde: a tool for collaborative software development
Team collaboration is essential for the success of multi-developer projects. When team members are spread across different locations, individual awareness of the activity of other...
Lile Hattori, Michele Lanza
ASPLOS
2009
ACM
15 years 10 months ago
ASSURE: automatic software self-healing using rescue points
Software failures in server applications are a significant problem for preserving system availability. We present ASSURE, a system that introduces rescue points that recover softw...
Stelios Sidiroglou, Oren Laadan, Carlos Perez, Nic...
VEE
2006
ACM
126views Virtualization» more  VEE 2006»
15 years 3 months ago
A new approach to real-time checkpointing
The progress towards programming methodologies that simplify the work of the programmer involves automating, whenever possible, activities that are secondary to the main task of d...
Antonio Cunei, Jan Vitek
SENSYS
2003
ACM
15 years 2 months ago
On the scaling laws of dense wireless sensor networks
We consider dense wireless sensor networks deployed to observe arbitrary random fields. The requirement is to reconstruct an estimate of the random field at a certain collector ...
Praveen Kumar Gopala, Hesham El Gamal