Sciweavers

2610 search results - page 434 / 522
» Computational Probabilistic Non-interference
Sort
View
179
Voted
SIGMOD
2008
ACM
147views Database» more  SIGMOD 2008»
16 years 22 days ago
A demonstration of Cascadia through a digital diary application
The Cascadia system provides RFID-based pervasive computing applications with an infrastructure for specifying, extracting and managing meaningful high-level events from raw RFID ...
Christopher Ré, Dan Suciu, Evan Welbourne, ...
171
Voted
SIGMOD
2007
ACM
169views Database» more  SIGMOD 2007»
16 years 22 days ago
Scalable approximate query processing with the DBO engine
This paper describes query processing in the DBO database system. Like other database systems designed for ad-hoc, analytic processing, DBO is able to compute the exact answer to ...
Christopher M. Jermaine, Subramanian Arumugam, Abh...
179
Voted
SIGMOD
2005
ACM
107views Database» more  SIGMOD 2005»
16 years 22 days ago
Relational Confidence Bounds Are Easy With The Bootstrap
Statistical estimation and approximate query processing have become increasingly prevalent applications for database systems. However, approximation is usually of little use witho...
Abhijit Pol, Chris Jermaine
100
Voted
PERCOM
2006
ACM
16 years 5 days ago
Developing a Model for Trust Management in Pervasive Devices
Pervasive devices interacting in open and dynamic spaces with each others require a mechanism that allows them acting autonomously in a secure way and protecting their resources. ...
Andrés Marín López, Daniel Di...
93
Voted
MOBIHOC
2006
ACM
16 years 5 days ago
Throughput and delay optimization in interference-limited multihop networks
The performance of a multihop wireless network is typically affected by the interference caused by transmissions in the same network. In a statistical fading environment, the inte...
Ahmed Bader, Eylem Ekici