Sciweavers

4217 search results - page 711 / 844
» Computational indistinguishability logic
Sort
View
101
Voted
ICDE
2010
IEEE
212views Database» more  ICDE 2010»
16 years 16 days ago
ViewJoin: Efficient View-based Evaluation of Tree Pattern Queries
A fundamental problem in XML query processing is tree pattern query (TPQ) matching which computes all data instances in an XML database that match an input TPQ. There is a lot of r...
Ding Chen, Chee-Yong Chan
89
Voted
PERCOM
2008
ACM
16 years 11 days ago
Topology Formation in IEEE 802.15.4: Cluster-Tree Characterization
The IEEE 802.15.4 standard defines a set of procedures to set-up a Low-Rate Wireless Personal Area Network where nodes self-organize into a logical communication structure through ...
Francesca Cuomo, Sara Della Luna, Petia Todorova, ...
95
Voted
PERCOM
2007
ACM
16 years 11 days ago
SOS: Secure Overlay Sensornets
Overlay Networks (ONs) are logical networks built on top of a physical network with the aim of moving part of the routing complexity to the application layer. At the same time, sen...
Leonardo B. Oliveira, Antonio Alfredo Ferreira Lou...
89
Voted
PERCOM
2006
ACM
16 years 11 days ago
Ordering Management Actions in Pervasive Systems using Specification-enhanced Policies
A pervasive system features a plethora of devices, services and applications organized as a large distributed system. One approach to managing such systems is by policies where ad...
Chetan Shiva Shankar, Roy H. Campbell
90
Voted
PERCOM
2006
ACM
16 years 11 days ago
Managing Pervasive Systems using Role-based Obligation Policies
Pervasive systems are complex distributed systems containing heterogeneous and mobile devices, services and applications. Policy-based management is an effective approach for mana...
Chetan Shiva Shankar, Roy H. Campbell