Sciweavers

805 search results - page 137 / 161
» On the Role of Integrity Constraints in Data Integration
Sort
View
101
Voted
ICC
2007
IEEE
130views Communications» more  ICC 2007»
15 years 4 months ago
A Novel Key Redistribution Scheme for Wireless Sensor Networks
— Key management has long been a challenging problem in wireless Distributed Sensor Networks (DSNs) due to their high security requirements and strict resource constraints. Recen...
Chun-Fai Law, Ka-Shun Hung, Yu-Kwong Kwok
85
Voted
ICDCSW
2007
IEEE
15 years 4 months ago
Exploiting Gossip for Self-Management in Scalable Event Notification Systems
1 Challenges of scale have limited the development of event notification systems with strong properties, despite the urgent demand for consistency, reliability, security, and other...
Ken Birman, Anne-Marie Kermarrec, Krzysztof Ostrow...
CODES
2006
IEEE
15 years 3 months ago
Layout aware design of mesh based NoC architectures
Design of System-on-Chip (SoC) with regular mesh based Network-on-Chip (NoC) consists of mapping processing cores to routers, and routing of the traffic traces on the topology suc...
Krishnan Srinivasan, Karam S. Chatha
ECLIPSE
2006
ACM
15 years 3 months ago
XPlainer-Eclipse: explaining XPath within Eclipse
The popularity of XML has motivated the development of novel XML processing tools many of which embed the XPath language for XML querying, transformation, constraint specificatio...
John W. S. Liu, Mariano P. Consens, Flavio Rizzolo
VALUETOOLS
2006
ACM
113views Hardware» more  VALUETOOLS 2006»
15 years 3 months ago
Load prediction models in web-based systems
Run-time management of modern Web-based services requires the integration of several algorithms and mechanisms for job dispatching, load sharing, admission control, overload detec...
Mauro Andreolini, Sara Casolari