Sciweavers

4078 search results - page 743 / 816
» On the Emergence of New Computer Technologies
Sort
View
ECMDAFA
2009
Springer
119views Hardware» more  ECMDAFA 2009»
14 years 9 months ago
Managing Model Adaptation by Precise Detection of Metamodel Changes
Technological and business changes influence the evolution of software systems. When this happens, the software artifacts may need to be adapted to the changes. This need is rapidl...
Kelly Garcés, Frédéric Jouaul...
DPD
2010
153views more  DPD 2010»
14 years 9 months ago
Cardinality estimation and dynamic length adaptation for Bloom filters
Abstract Bloom filters are extensively used in distributed applications, especially in distributed databases and distributed information systems, to reduce network requirements and...
Odysseas Papapetrou, Wolf Siberski, Wolfgang Nejdl
FIT
2010
14 years 6 months ago
A survey of services placement mechanisms for future mobile communication networks
Mobile communication networks experience a tremendous growth. According to the vision of Wireless World Research Forum (WWRF), there will be 7 trillion wireless devices serving 7 ...
Shahzad Ali, Andreas Mitschele-Thiel, Ali Diab, Am...
JAISE
2010
182views Algorithms» more  JAISE 2010»
14 years 6 months ago
Exploring semantics in activity recognition using context lattices
Studying human activities has significant implication in human beneficial applications such as personal healthcare. This research has been facilitated by the development of sensor ...
Juan Ye, Simon Dobson
JDCTA
2010
175views more  JDCTA 2010»
14 years 6 months ago
Evolution Cipher against Differential Power Attack
: Differntial Power Attack (DPA) is one kind of Side Channel Attacks (SCAs). There are two phases in DPA attacks: sample collection and statistical analysis, which can be utilized ...
Shubo Liu, Ming Tang, Si Gao, Huanguo Zhang