Sciweavers

880 search results - page 149 / 176
» Mobile data and transaction management
Sort
View
ICDE
1998
IEEE
83views Database» more  ICDE 1998»
16 years 1 months ago
Grouping Techniques for Update Propagation in Intermittently Connected Databases
We consider an environment where one or more servers carry databases that are of interest to a community of clients. The clients are only intermittently connected to the server fo...
Sameer Mahajan, Michael J. Donahoo, Shamkant B. Na...
MHCI
2009
Springer
15 years 6 months ago
Hoverflow: exploring around-device interaction with IR distance sensors
By equipping a mobile device with distance sensing capabilities, we aim to expand the interaction possibilities of mobile and wearable devices beyond the confines of the physical ...
Sven G. Kratz, Michael Rohs
SIGMOD
2007
ACM
156views Database» more  SIGMOD 2007»
15 years 12 months ago
JouleSort: a balanced energy-efficiency benchmark
The energy efficiency of computer systems is an important concern in a variety of contexts. In data centers, reducing energy use improves operating cost, scalability, reliability,...
Suzanne Rivoire, Mehul A. Shah, Parthasarathy Rang...
PERCOM
2006
ACM
15 years 11 months ago
Context and Location-Aware Encryption for Pervasive Computing Environments
Pervasive computing promises to revolutionize computing, empower mobile users, and enhance mobility, customizability and adaptability of computing environments. Intrinsic to the n...
Jalal Al-Muhtadi, Raquel L. Hill, Roy H. Campbell,...
SISW
2005
IEEE
15 years 5 months ago
Adding Secure Deletion to Your Favorite File System
Files or even their names often contain confidential or secret information. Most users believe that such information is erased as soon as they delete a file. Even those who know...
Nikolai Joukov, Erez Zadok