Sciweavers

16968 search results - page 3309 / 3394
» Software Engineering in the Small
Sort
View
IJSNET
2008
118views more  IJSNET 2008»
14 years 12 months ago
Public key cryptography empowered smart dust is affordable
: Public key cryptography (PKC) has been considered for a long time to be computationally too expensive for small battery powered devices. However, PKC turned out to be very benefi...
Steffen Peter, Peter Langendörfer, Krzysztof ...
ECOI
2007
80views more  ECOI 2007»
14 years 12 months ago
EcoLens: Integration and interactive visualization of ecological datasets
Complex multi-dimensional datasets are now pervasive in science and elsewhere in society. Better interactive tools are needed for visual data exploration so that patterns in such ...
Cynthia Sims Parr, Bongshin Lee, Benjamin B. Beder...
ENTCS
2007
113views more  ENTCS 2007»
14 years 11 months ago
Modular Checkpointing for Atomicity
Transient faults that arise in large-scale software systems can often be repaired by re-executing the code in which they occur. Ascribing a meaningful semantics for safe re-execut...
Lukasz Ziarek, Philip Schatz, Suresh Jagannathan
SIGIR
2008
ACM
14 years 11 months ago
Relevance assessment: are judges exchangeable and does it matter
We investigate to what extent people making relevance judgements for a reusable IR test collection are exchangeable. We consider three classes of judge: "gold standard" ...
Peter Bailey, Nick Craswell, Ian Soboroff, Paul Th...
94
Voted
SIGMETRICS
2008
ACM
140views Hardware» more  SIGMETRICS 2008»
14 years 11 months ago
Scalable VPN routing via relaying
Enterprise customers are increasingly adopting MPLS (Multiprotocol Label Switching) VPN (Virtual Private Network) service that offers direct any-to-any reachability among the cust...
Changhoon Kim, Alexandre Gerber, Carsten Lund, Dan...
« Prev « First page 3309 / 3394 Last » Next »