Sciweavers

2913 search results - page 52 / 583
» How Much to Copy
Sort
View
178
Voted
SIGMOD
2008
ACM
198views Database» more  SIGMOD 2008»
16 years 29 days ago
Efficient storage scheme and query processing for supply chain management using RFID
As the size of an RFID tag becomes smaller and the price of the tag gets lower, RFID technology has been applied to a wide range of areas. Recently, RFID has been adopted in the b...
Chun-Hee Lee, Chin-Wan Chung
213
Voted
SIGMOD
2008
ACM
162views Database» more  SIGMOD 2008»
16 years 29 days ago
Event queries on correlated probabilistic streams
A major problem in detecting events in streams of data is that the data can be imprecise (e.g. RFID data). However, current state-ofthe-art event detection systems such as Cayuga ...
Christopher Ré, Dan Suciu, Julie Letchner, ...
PODS
2008
ACM
165views Database» more  PODS 2008»
16 years 28 days ago
Data exchange and schema mappings in open and closed worlds
In the study of data exchange one usually assumes an openworld semantics, making it possible to extend instances of target schemas. An alternative closed-world semantics only move...
Leonid Libkin, Cristina Sirangelo
105
Voted
MOBISYS
2004
ACM
16 years 12 days ago
Divert: Fine-grained Path Selection for Wireless LANs
The performance of Wireless Local Area Networks (WLANs) often suffers from link-layer frame losses caused by noise, interference, multipath, attenuation, and user mobility. We obs...
Allen K. L. Miu, Godfrey Tan, Hari Balakrishnan, J...
112
Voted
MOBIHOC
2008
ACM
16 years 12 days ago
Delegation forwarding
Mobile opportunistic networks are characterized by unpredictable mobility, heterogeneity of contact rates and lack of global information. Successful delivery of messages at low co...
Vijay Erramilli, Mark Crovella, Augustin Chaintrea...