Sciweavers

2335 search results - page 458 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
AINA
2009
IEEE
15 years 4 months ago
Services to the Field: An Approach for Resource Constrained Sensor/Actor Networks
Nowadays more and more devices of daily life are connected to each other and are integrated into massively distributed networks of embedded devices. These devices range from consu...
Christian Buckl, Stephan Sommer, Andreas Scholz, A...
CASES
2006
ACM
15 years 5 months ago
Adaptive object code compression
Previous object code compression schemes have employed static and semiadaptive compression algorithms to reduce the size of instruction memory in embedded systems. The suggestion ...
John Gilbert, David M. Abrahamson
106
Voted
SIGMETRICS
2010
ACM
208views Hardware» more  SIGMETRICS 2010»
15 years 4 months ago
Dynamics in congestion games
Game theoretic modeling and equilibrium analysis of congestion games have provided insights in the performance of Internet congestion control, road transportation networks, etc. D...
Devavrat Shah, Jinwoo Shin
182
Voted
GIS
2005
ACM
16 years 20 days ago
Close pair queries in moving object databases
Databases of moving objects are important for air traffic control, ground traffic, and battlefield configurations. We introduce the (historical and spatial) range close-pair query...
Panfeng Zhou, Donghui Zhang, Betty Salzberg, Gene ...
105
Voted
KDD
2006
ACM
130views Data Mining» more  KDD 2006»
16 years 22 hour ago
Efficient anonymity-preserving data collection
The output of a data mining algorithm is only as good as its inputs, and individuals are often unwilling to provide accurate data about sensitive topics such as medical history an...
Justin Brickell, Vitaly Shmatikov