Sciweavers

2438 search results - page 430 / 488
» Consistent Gradient Operators
Sort
View
EDBT
2008
ACM
137views Database» more  EDBT 2008»
15 years 10 months ago
Data exchange in the presence of arithmetic comparisons
Data exchange is the problem of transforming data structured under a schema (called source) into data structured under a different schema (called target). The emphasis of data exc...
Foto N. Afrati, Chen Li, Vassia Pavlaki
ICSE
2005
IEEE-ACM
15 years 9 months ago
Re-engineering software architecture of home service robots: a case study
With the advances of robotics, computer science, and other related areas, home service robots attract much attention from both academia and industry. Home service robots consists ...
Moonzoo Kim, Jaejoon Lee, Kyo Chul Kang, Youngjin ...
PERCOM
2005
ACM
15 years 9 months ago
Security Parallels between People and Pervasive Devices
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
Stephen A. Weis
MOBISYS
2008
ACM
15 years 9 months ago
Brimon: a sensor network system for railway bridge monitoring
: Railway systems are critical in many regions, and can consist of several tens of thousands of bridges, being used over several decades. It is critical to have a system to monitor...
Kameswari Chebrolu, Bhaskaran Raman, Nilesh Mishra...
MOBIHOC
2005
ACM
15 years 9 months ago
Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks
Mobile sinks are needed in many sensor network applications for efficient data collection, data querying, localized sensor reprogramming, identifying and revoking compromised sens...
Wensheng Zhang, Hui Song, Sencun Zhu, Guohong Cao