Sciweavers

950 search results - page 177 / 190
» Continuous Queries over Data Streams - Semantics and Impleme...
Sort
View
KDD
2005
ACM
124views Data Mining» more  KDD 2005»
15 years 11 months ago
A multinomial clustering model for fast simulation of computer architecture designs
Computer architects utilize simulation tools to evaluate the merits of a new design feature. The time needed to adequately evaluate the tradeoffs associated with adding any new fe...
Kaushal Sanghai, Ting Su, Jennifer G. Dy, David R....
VLDB
2004
ACM
93views Database» more  VLDB 2004»
15 years 4 months ago
Symmetric Relations and Cardinality-Bounded Multisets in Database Systems
In a binary symmetric relationship, A is related to B if and only if B is related to A. Symmetric relationships between k participating entities can be represented as multisets of...
Kenneth A. Ross, Julia Stoyanovich
84
Voted
GLOBECOM
2008
IEEE
15 years 5 months ago
Distributed Multi-Interface Multi-Channel Random Access
— The aggregate capacity of wireless ad-hoc networks can be substantially increased if each wireless node is equipped with multiple network interface cards (NICs) and each NIC op...
Amir Hamed Mohsenian Rad, Vincent W. S. Wong
COMPSAC
2006
IEEE
15 years 5 months ago
A Communication Virtual Machine
The convergence of data, voice and multimedia communication over digital networks, coupled with continuous improvement in network capacity and reliability has significantly enrich...
Yi Deng, Seyed Masoud Sadjadi, Peter J. Clarke, Ch...
92
Voted
JNW
2008
126views more  JNW 2008»
14 years 11 months ago
Securing Wireless Sensor Networks: Security Architectures
Wireless sensor networking remains one of the most exciting and challenging research domains of our time. As technology progresses, so do the capabilities of sensor networks. Limit...
David Boyle, Thomas Newe