Sciweavers

1833 search results - page 58 / 367
» Mechanized Verification with Sharing
Sort
View
99
Voted
SIGMOD
1995
ACM
148views Database» more  SIGMOD 1995»
15 years 4 months ago
Copy Detection Mechanisms for Digital Documents
In a digital library system, documents are available in digital form and therefore are more easily copied and their copyrights are more easily violated. This is a very serious pro...
Sergey Brin, James Davis, Hector Garcia-Molina
119
Voted
JWSR
2008
98views more  JWSR 2008»
15 years 19 days ago
Mining and Improving Composite Web Services Recovery Mechanisms
: Ensuring composite services reliability is a challenging problem. Indeed, due to the inherent autonomy and heterogeneity of Web services it is difficult to predict and reason abo...
Sami Bhiri, Walid Gaaloul, Claude Godart
84
Voted
JSAC
2006
127views more  JSAC 2006»
15 years 19 days ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
131
Voted
IPCCC
2006
IEEE
15 years 6 months ago
A novel queue management mechanism for improving performance of multihop flows in IEEE 802.11s based mesh networks
– Wireless Mesh networks exploit multi-hop wireless communications between Access Points to replace wired infrastructure. However, in multi-hop networks, effective bandwidth decr...
Nagesh Nandiraju, Deepti S. Nandiraju, Dave Cavalc...
ISCA
2005
IEEE
147views Hardware» more  ISCA 2005»
15 years 6 months ago
Interconnections in Multi-Core Architectures: Understanding Mechanisms, Overheads and Scaling
This paper examines the area, power, performance, and design issues for the on-chip interconnects on a chip multiprocessor, attempting to present a comprehensive view of a class o...
Rakesh Kumar, Victor V. Zyuban, Dean M. Tullsen