Sciweavers

10689 search results - page 1891 / 2138
» How informances can be used in design ethnography
Sort
View
MOBIHOC
2005
ACM
16 years 1 months ago
An efficient scheme for authenticating public keys in sensor networks
With the advance of technology, Public Key Cryptography (PKC) will sooner or later be widely used in wireless sensor networks. Recently, it has been shown that the performance of ...
Wenliang Du, Ronghua Wang, Peng Ning
IWSSD
1993
IEEE
15 years 6 months ago
Fine-Grain Process Modelling
In this paper, we propose the use of fine-grain process modelling as an aid to software development. We suggest the use of two levels of granularity, one at the level of the indiv...
Bashar Nuseibeh, Anthony Finkelstein, Jeff Kramer
ICFP
2010
ACM
15 years 2 months ago
The impact of higher-order state and control effects on local relational reasoning
Reasoning about program equivalence is one of the oldest problems in semantics. In recent years, useful techniques have been developed, based on bisimulations and logical relation...
Derek Dreyer, Georg Neis, Lars Birkedal
JCB
2006
185views more  JCB 2006»
15 years 1 months ago
A Probabilistic Methodology for Integrating Knowledge and Experiments on Biological Networks
Biological systems are traditionally studied by focusing on a specific subsystem, building an intuitive model for it, and refining the model using results from carefully designed ...
Irit Gat-Viks, Amos Tanay, Daniela Raijman, Ron Sh...
157
Voted
VLDB
2002
ACM
143views Database» more  VLDB 2002»
15 years 1 months ago
SQL Memory Management in Oracle9i
Complex database queries require the use of memory-intensive operators like sort and hashjoin. Those operators need memory, also referred to as SQL memory, to process their input ...
Benoît Dageville, Mohamed Zaït
« Prev « First page 1891 / 2138 Last » Next »