Sciweavers

12562 search results - page 2211 / 2513
» Distributed Xbean Applications
Sort
View
136
Voted
AINA
2009
IEEE
15 years 8 months ago
Services to the Field: An Approach for Resource Constrained Sensor/Actor Networks
Nowadays more and more devices of daily life are connected to each other and are integrated into massively distributed networks of embedded devices. These devices range from consu...
Christian Buckl, Stephan Sommer, Andreas Scholz, A...
145
Voted
ISCA
2010
IEEE
284views Hardware» more  ISCA 2010»
15 years 8 months ago
Security refresh: prevent malicious wear-out and increase durability for phase-change memory with dynamically randomized address
Phase change memory (PCM) is an emerging memory technology for future computing systems. Compared to other non-volatile memory alternatives, PCM is more matured to production, and...
Nak Hee Seong, Dong Hyuk Woo, Hsien-Hsin S. Lee
130
Voted
COMPGEOM
2010
ACM
15 years 8 months ago
On degrees in random triangulations of point sets
We study the expected number of interior vertices of degree i in a triangulation of a point set S, drawn uniformly at random from the set of all triangulations of S, and derive va...
Micha Sharir, Adam Sheffer, Emo Welzl
143
Voted
PLDI
2010
ACM
15 years 8 months ago
Smooth interpretation
We present smooth interpretation, a method to systematically approximate numerical imperative programs by smooth mathematical functions. This approximation facilitates the use of ...
Swarat Chaudhuri, Armando Solar-Lezama
162
Voted
PODS
2010
ACM
306views Database» more  PODS 2010»
15 years 8 months ago
Optimizing linear counting queries under differential privacy
Differential privacy is a robust privacy standard that has been successfully applied to a range of data analysis tasks. But despite much recent work, optimal strategies for answe...
Chao Li, Michael Hay, Vibhor Rastogi, Gerome Mikla...
« Prev « First page 2211 / 2513 Last » Next »