Sciweavers

2995 search results - page 394 / 599
» On multi-avoidance of generalized patterns
Sort
View
MOBIWAC
2006
ACM
15 years 9 months ago
Sink mobility protocols for data collection in wireless sensor networks
In wireless sensor networks data propagation is usually performed by sensors transmitting data towards a static control center (sink). Inspired by important applications (mostly r...
Ioannis Chatzigiannakis, Athanasios Kinalis, Sotir...
159
Voted
MSWIM
2006
ACM
15 years 9 months ago
Analysis of soft handover measurements in 3G network
A neural network based clustering method for the analysis of soft handovers in 3G network is introduced. The method is highly visual and it could be utilized in explorative analys...
Kimmo Raivio
117
Voted
PPOPP
2006
ACM
15 years 9 months ago
Proving correctness of highly-concurrent linearisable objects
We study a family of implementations for linked lists using finegrain synchronisation. This approach enables greater concurrency, but correctness is a greater challenge than for ...
Viktor Vafeiadis, Maurice Herlihy, Tony Hoare, Mar...
147
Voted
PPPJ
2006
ACM
15 years 9 months ago
Mapping clouds of SOA- and business-related events for an enterprise cockpit in a Java-based environment
This paper is about business process management (BPM) and business activity monitoring (BAM) using event processing. We will show why the management of business processes is impor...
Daniel Jobst, Gerald Preissler
SACMAT
2006
ACM
15 years 9 months ago
Secure resource description framework: an access control model
In this paper we propose an access control model for the Resource Description Framework (RDF). We argue that existing access control models, like the ones developed for securing e...
Amit Jain, Csilla Farkas