Sciweavers

3524 search results - page 539 / 705
» Issues in Active Databases
Sort
View
121
Voted
ESORICS
2007
Springer
15 years 10 months ago
Cloak: A Ten-Fold Way for Reliable Covert Communications
A number of network covert channels have been proposed recently that may have important ramifications for Internet security and privacy. However, they could become ineffective in...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
119
Voted
DATE
2006
IEEE
78views Hardware» more  DATE 2006»
15 years 9 months ago
Wireless sensor networks and beyond
—Wireless Sensor Networks provide opportunities even outside their usual application domain of environmental monitoring. In this paper we present a case study on the use of Wirel...
Paul J. M. Havinga
CASES
2006
ACM
15 years 9 months ago
Architecture and circuit techniques for low-throughput, energy-constrained systems across technology generations
Rising interest in the applications of wireless sensor networks has spurred research in the development of computing systems for lowthroughput, energy-constrained applications. Un...
Mark Hempstead, Gu-Yeon Wei, David Brooks
125
Voted
ICITA
2005
IEEE
15 years 9 months ago
A Web Redirection Service for Variant Chinese Domain Name Resolution
Many efforts in past years have been made to lower the linguistic barriers for non-native English speakers to access the Internet. IDNA [2] focuses on access to Internationalized ...
Jeng-Wei Lin, Li-Ming Tseng, Jan-Ming Ho, Feipei L...
150
Voted
CD
2005
Springer
15 years 9 months ago
Modelling Deployment Using Feature Descriptions and State Models for Component-Based Software Product Families
Abstract. Products within a product family are composed of different component configurations where components have different variable features and a large amount of dependency re...
Slinger Jansen, Sjaak Brinkkemper