Sciweavers

5722 search results - page 954 / 1145
» Security Function Interactions
Sort
View
119
Voted
ICDE
2010
IEEE
186views Database» more  ICDE 2010»
16 years 3 months ago
Mini-Me: A Min-Repro System for Database Software
Testing and debugging database software is often challenging and time consuming. A very arduous task for DB testers is finding a min-repro ? the "simplest possible setup"...
Nicolas Bruno, Rimma V. Nehme
166
Voted
PERCOM
2006
ACM
16 years 3 months ago
A Multi-Commodity Flow Approach for Globally Aware Routing in Multi-Hop Wireless Networks
Routing in multi-hop wireless networks is typically greedy, with every connection attempting to establish a path that minimizes its number of hops. However, interference plays a m...
Vinay Kolar, Nael B. Abu-Ghazaleh
155
Voted
EWSN
2004
Springer
16 years 3 months ago
Improving the Energy Efficiency of Directed Diffusion Using Passive Clustering
Directed diffusion is a prominent example of data-centric routing based on application layer data and purely local interactions. In its functioning it relies heavily on network-wid...
Andreas Köpke, Christian Frank, Holger Karl, ...
110
Voted
WISE
2009
Springer
16 years 23 days ago
Personalizing the Interface in Rich Internet Applications
Recently, existing design methodologies targeting traditional Web applications have been extended for Rich Internet Application modeling support. These extended methodologies curre...
Irene Garrigós, Santiago Meliá, Sven...
123
Voted
ICCAD
2008
IEEE
140views Hardware» more  ICCAD 2008»
16 years 15 days ago
Correct-by-construction microarchitectural pipelining
— This paper presents a method for correct-by-construction microarchitectural pipelining that handles cyclic systems with dependencies between iterations. Our method combines pre...
Timothy Kam, Michael Kishinevsky, Jordi Cortadella...