Sciweavers

1961 search results - page 215 / 393
» PicoDBMS: Validation and Experience
Sort
View
79
Voted
SENSYS
2009
ACM
15 years 6 months ago
Collection tree protocol
This paper presents and evaluates two principles for wireless routing protocols. The first is datapath validation: data traffic quickly discovers and fixes routing inconsistenc...
Omprakash Gnawali, Rodrigo Fonseca, Kyle Jamieson,...
RTSS
1999
IEEE
15 years 3 months ago
Deriving Deadlines and Periods for Real-Time Update Transactions
Typically, temporal validity of real-time data is maintained by periodic update transactions. In this paper, we examine the problem of period and deadline assignment for these upda...
Ming Xiong, Krithi Ramamritham
106
Voted
OSDI
1996
ACM
15 years 28 days ago
Safe Kernel Extensions Without Run-Time Checking
This paper describes a mechanism by which an operating system kernel can determine with certainty that it is safe to execute a binary supplied by an untrusted source. The kernel r...
George C. Necula, Peter Lee
BMCBI
2010
127views more  BMCBI 2010»
14 years 11 months ago
PeptideMine - A webserver for the design of peptides for protein-peptide binding studies derived from protein-protein interactom
Background: Signal transduction events often involve transient, yet specific, interactions between structurally conserved protein domains and polypeptide sequences in target prote...
Khader Shameer, Lalima L. Madan, Shivamurthy Veera...
107
Voted
AIED
2009
Springer
15 years 6 months ago
Detecting the Learning Value of Items In a Randomized Problem Set
Researchers that make tutoring systems would like to know which pieces of educational content are most effective at promoting learning among their students. Randomized controlled e...
Zachary A. Pardos, Neil T. Heffernan