Sciweavers

505 search results - page 66 / 101
» Implementation of Belief Change Operators Using BDDs
Sort
View
92
Voted
JIPS
2006
110views more  JIPS 2006»
14 years 9 months ago
Monitoring Systems for Embedded Equipment in Ubiquitous Environments
: Accurate and efficient monitoring of dynamically changing environments is one of the most important requirements for ubiquitous network environments. Ubiquitous computing provide...
Ji-Hye Bae, Hee-Kuk Kang, Yoon-Young Park, Jung-Ho...
EDBT
2009
ACM
186views Database» more  EDBT 2009»
15 years 4 months ago
Automating the loading of business process data warehouses
Business processes drive the operations of an enterprise. In the past, the focus was primarily on business process design, modeling, and automation. Recently, enterprises have rea...
Malú Castellanos, Alkis Simitsis, Kevin Wil...
SRDS
2006
IEEE
15 years 3 months ago
WRAPS: Denial-of-Service Defense through Web Referrals
The web is a complicated graph, with millions of websites interlinked together. In this paper, we propose to use this web sitegraph structure to mitigate flooding attacks on a we...
XiaoFeng Wang, Michael K. Reiter
ECRTS
2004
IEEE
15 years 1 months ago
TLSF: A New Dynamic Memory Allocator for Real-Time Systems
Dynamic storage allocation (DSA) algorithms play an important role in the modern software engineering paradigms and techniques (such as object oriented programming). Using DSA inc...
Miguel Masmano, Ismael Ripoll, Alfons Crespo, Jorg...
SIGCOMM
1995
ACM
15 years 1 months ago
Software Support for Outboard Buffering and Checksumming
Data copying and checksumming are the most expensive operations when doing high-bandwidth network IO over a highspeed network. Under some conditions, outboard buffering and checks...
Karl Kleinpaste, Peter Steenkiste, Brian Zill