Sciweavers

892 search results - page 162 / 179
» Risks of rapid application development
Sort
View
151
Voted
SIGMOD
2007
ACM
188views Database» more  SIGMOD 2007»
15 years 9 months ago
Keyword search on relational data streams
Increasing monitoring of transactions, environmental parameters, homeland security, RFID chips and interactions of online users rapidly establishes new data sources and applicatio...
Alexander Markowetz, Yin Yang, Dimitris Papadias
76
Voted
COMPSAC
2009
IEEE
15 years 4 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz
IMC
2009
ACM
15 years 4 months ago
TCP revisited: a fresh look at TCP in the wild
Since the last in-depth studies of measured TCP traffic some 68 years ago, the Internet has experienced significant changes, including the rapid deployment of backbone links wit...
Feng Qian, Alexandre Gerber, Zhuoqing Morley Mao, ...
MOBIWAC
2009
ACM
15 years 4 months ago
Protocol design and analysis of a HIP-based per-application mobility management platform
Rapid evolution of wireless networking has provided wide-scale of different wireless access technologies like Bluetooth, ZigBee, 802.11a/b/g, DSRC, 3G UMTS, LTE, WiMAX, etc. The c...
László Bokor, László T...
ICCCN
2007
IEEE
15 years 3 months ago
Node-Replacement Policies to Maintain Threshold-Coverage in Wireless Sensor Networks
Abstract— With the rapid deployment of wireless sensor networks, there are several new sensing applications with specific requirements. Specifically, target tracking applicatio...
Sachin Parikh, Vinod Vokkarane, Liudong Xing, Daya...