Sciweavers

2686 search results - page 311 / 538
» Parallel object monitors
Sort
View
RULES
1995
Springer
92views Database» more  RULES 1995»
15 years 7 months ago
Rule Contexts in Active Databases - A Mechanism for Dynamic Rule Grouping
Engineering applications that use Active DBMSs (ADBMSs) often need to group activities into modes that are shifted during the execution of different tasks. This paper presents a me...
Martin Sköld, Esa Falkenroth, Tore Risch
TMC
2012
13 years 6 months ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright
ANCS
2006
ACM
15 years 7 months ago
Efficient memory utilization on network processors for deep packet inspection
Deep Packet Inspection (DPI) refers to examining both packet header and payload to look for predefined patterns, which is essential for network security, intrusion detection and c...
Piti Piyachon, Yan Luo
256
Voted
VCIP
2000
128views Communications» more  VCIP 2000»
15 years 5 months ago
Video Quality Experts Group: current results and future directions
Subjective assessment methods have been used reliably for many years to evaluate video quality. They continue to provide the most reliable assessments compared to objective method...
Ann M. Rohaly, Philip J. Corriveau, John M. Libert...
132
Voted
SAC
2010
ACM
15 years 11 months ago
Checking concurrent contracts with aspects
The applicability of aspects as a means of implementing runtime contract checking has been demonstrated in prior work, where contracts are identified as cross-cutting concerns [1...
Eric Kerfoot, Steve McKeever