Sciweavers

3524 search results - page 314 / 705
» Issues in Active Databases
Sort
View
CHI
2004
ACM
16 years 5 months ago
a CAPpella: programming by demonstration of context-aware applications
Context-aware applications are applications that implicitly take their context of use into account by adapting to changes in a user's activities and environments. No one has ...
Anind K. Dey, Raffay Hamid, Chris Beckmann, Ian Li...
PERCOM
2007
ACM
16 years 4 months ago
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking...
Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. ...
ICCD
2008
IEEE
117views Hardware» more  ICCD 2008»
16 years 1 months ago
RMA: A Read Miss-Based Spin-Down Algorithm using an NV cache
—It is an important issue to reduce the power consumption of a hard disk that takes a large amount of computer system’s power. As a new trend, an NV cache is used to make a dis...
Hyotaek Shim, Jaegeuk Kim, Dawoon Jung, Jin-Soo Ki...
SEAA
2008
IEEE
15 years 11 months ago
Service Coroner: A Diagnostic Tool for Locating OSGi Stale References
The OSGi Services Platform provides a framework for the dynamic deployment of Java-based applications. It allows to install, to activate, to update and to uninstall application mo...
Kiev Gama, Didier Donsez
COMSWARE
2007
IEEE
15 years 11 months ago
Exploiting Energy-aware Spatial Correlation in Wireless Sensor Networks
Abstract— Wireless sensor networks (WSNs) promise finegrain monitoring in a wide variety of applications, which require dense sensor nodes deployment. Due to high density of nod...
Ghalib A. Shah, Muslim Bozyigit