Sciweavers

2111 search results - page 18 / 423
» How to Program Pervasive Systems
Sort
View
89
Voted
OSDI
2000
ACM
15 years 1 months ago
How to Build a Trusted Database System on Untrusted Storage
Some emerging applications require programs to maintain sensitive state on untrusted hosts. This paper presents the architecture and implementation of a trusted database system, T...
Umesh Maheshwari, Radek Vingralek, William Shapiro
SAINT
2006
IEEE
15 years 6 months ago
A Pervasive Internet Approach to Fine-Grain Power-Aware Computing
We present a novel approach to conserve power in networked mobile devices. Our approach exploits communication within a pervasive smart space as an opportunity to save power as op...
Ahmed Abukmail, Abdelsalam Helal
WMCSA
2002
IEEE
15 years 5 months ago
Composing Pervasive Data Using iQL
The emergence of pervasive networked data sources, such as web services, sensors, and mobile devices, enables context-sensitive, mobile applications. We have developed a programmi...
Norman H. Cohen, Hui Lei, Paul Castro, John S. Dav...
98
Voted
ECEH
2006
120views Healthcare» more  ECEH 2006»
15 years 1 months ago
Efficient Networking for Pervasive eHealth Applications
: This paper presents the networking architecture developed in the CASCOM research project. This architecture provides an efficient and reliable communication support and service d...
Heikki Helin, Tim Van Pelt, Michael Schumacher, Ah...
ECOOP
1993
Springer
15 years 4 months ago
Integrating Independently-Developed Components in Object-Oriented Languages
Object-oriented programming promises to increase programmer productivity through better reuse of existing code. However, reuse is not yet pervasive in today’s object-oriented pro...
Urs Hölzle