Sciweavers

7080 search results - page 1158 / 1416
» Designing High Integrity Systems Using Aspects
Sort
View
CSE
2009
IEEE
15 years 10 months ago
Security Implications of Virtualization: A Literature Study
— Data centers accumulate corporate and personal data at a rapid pace. Driven by economy of scale and the high bandwidth of today’s network connections, more and more businesse...
André van Cleeff, Wolter Pieters, Roel Wier...
ESTIMEDIA
2009
Springer
15 years 10 months ago
QoS management of dynamic video tasks by task splitting and skipping
—We have integrated processing with deterministic and non-deterministic resource usage in an overall application and evaluated its performance on a multi-core processor platform....
Rob Albers, Eric Suijs, Peter H. N. de With
DASFAA
2007
IEEE
208views Database» more  DASFAA 2007»
15 years 10 months ago
Probabilistic Nearest-Neighbor Query on Uncertain Objects
Nearest-neighbor queries are an important query type for commonly used feature databases. In many different application areas, e.g. sensor databases, location based services or fac...
Hans-Peter Kriegel, Peter Kunath, Matthias Renz
SRDS
2007
IEEE
15 years 10 months ago
Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks
Sensors that operate in an unattended, harsh or hostile environment are vulnerable to compromises because their low costs preclude the use of expensive tamper-resistant hardware. ...
Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao
SEMWEB
2007
Springer
15 years 10 months ago
Optimizing the Retrieval of Pertinent Answers for NL Questions with the E-Librarian Service
Abstract. There is a growing discrepancy between the creation of digital content and its actual employment and usefulness in a learning society. Technologies for recording lectures...
Serge Linckels, Harald Sack, Christoph Meinel
« Prev « First page 1158 / 1416 Last » Next »