Sciweavers

2610 search results - page 434 / 522
» Computational Probabilistic Non-interference
Sort
View
SIGMOD
2008
ACM
147views Database» more  SIGMOD 2008»
16 years 3 months ago
A demonstration of Cascadia through a digital diary application
The Cascadia system provides RFID-based pervasive computing applications with an infrastructure for specifying, extracting and managing meaningful high-level events from raw RFID ...
Christopher Ré, Dan Suciu, Evan Welbourne, ...
SIGMOD
2007
ACM
169views Database» more  SIGMOD 2007»
16 years 3 months ago
Scalable approximate query processing with the DBO engine
This paper describes query processing in the DBO database system. Like other database systems designed for ad-hoc, analytic processing, DBO is able to compute the exact answer to ...
Christopher M. Jermaine, Subramanian Arumugam, Abh...
SIGMOD
2005
ACM
107views Database» more  SIGMOD 2005»
16 years 3 months ago
Relational Confidence Bounds Are Easy With The Bootstrap
Statistical estimation and approximate query processing have become increasingly prevalent applications for database systems. However, approximation is usually of little use witho...
Abhijit Pol, Chris Jermaine
PERCOM
2006
ACM
16 years 2 months ago
Developing a Model for Trust Management in Pervasive Devices
Pervasive devices interacting in open and dynamic spaces with each others require a mechanism that allows them acting autonomously in a secure way and protecting their resources. ...
Andrés Marín López, Daniel Di...
MOBIHOC
2006
ACM
16 years 2 months ago
Throughput and delay optimization in interference-limited multihop networks
The performance of a multihop wireless network is typically affected by the interference caused by transmissions in the same network. In a statistical fading environment, the inte...
Ahmed Bader, Eylem Ekici