Sciweavers

767 search results - page 135 / 154
» Changing how people view changes on the web
Sort
View
SIGMOD
2006
ACM
126views Database» more  SIGMOD 2006»
15 years 9 months ago
Constraint chaining: on energy-efficient continuous monitoring in sensor networks
Wireless sensor networks have created new opportunities for data collection in a variety of scenarios, such as environmental and industrial, where we expect data to be temporally ...
Adam Silberstein, Jun Yang 0001, Rebecca Braynard
ADBIS
2006
Springer
109views Database» more  ADBIS 2006»
15 years 3 months ago
Content Is Capricious: A Case for Dynamic System Generation
Abstract. Database modeling is based on the assumption of a high regularity of its application areas, an assumption which applies to both the structure of data and the behavior of ...
Hans-Werner Sehring, Sebastian Bossung, Joachim W....
HICSS
2003
IEEE
188views Biometrics» more  HICSS 2003»
15 years 3 months ago
A Collaborative Project Management Architecture
The Project Management (PM) paradigm is rapidly shifting due to business globalization and information technology (IT) advances that support distributed and virtual project teams....
Fang Chen, Nicholas C. Romano Jr., Jay F. Nunamake...
ICALP
2003
Springer
15 years 2 months ago
Anycasting in Adversarial Systems: Routing and Admission Control
Abstract. In this paper we consider the problem of routing packets in dynamically changing networks, using the anycast mode. In anycasting, a packet may have a set of destinations ...
Baruch Awerbuch, André Brinkmann, Christian...
ASPLOS
2006
ACM
14 years 11 months ago
Tradeoffs in fine-grained heap memory protection
Different uses of memory protection schemes have different needs in terms of granularity. For example, heap security can benefit from chunk separation (by using protected "pa...
Jianli Shen, Guru Venkataramani, Milos Prvulovic