Sciweavers

10625 search results - page 1827 / 2125
» Supporting delay-intolerant applications
Sort
View
SAC
2010
ACM
15 years 6 months ago
A generative pattern model for mining binary datasets
In many application fields, huge binary datasets modeling real life-phenomena are daily produced. The dataset records are usually associated with observations of some events, and...
Claudio Lucchese, Salvatore Orlando, Raffaele Pere...
85
Voted
TEI
2010
ACM
199views Hardware» more  TEI 2010»
15 years 6 months ago
Revealing the invisible: visualizing the location and event flow of distributed physical devices
Distributed physical user interfaces comprise networked sensors, actuators and other devices attached to a variety of computers in different locations. Developing such systems is ...
Nicolai Marquardt, Tom Gross, M. Sheelagh T. Carpe...
CCS
2010
ACM
15 years 6 months ago
Toward practical authorization-dependent user obligation systems
Many authorization system models include some notion of obligation. Little attention has been given to user obligations that depend on and affect authorizations. However, to be u...
Murillo Pontual, Omar Chowdhury, William H. Winsbo...
IPSN
2010
Springer
15 years 6 months ago
Slotted programming for sensor networks
We advocate a novel programming approach we call slotted programming that not only addresses the specific hardware capabilities of sensor nodes, but also facilitates coding throu...
Roland Flury, Roger Wattenhofer
AINA
2009
IEEE
15 years 6 months ago
Evaluation and Optimization of the Registrar Redundancy Handling in Reliable Server Pooling Systems
Abstract—The Reliable Server Pooling (RSerPool) architecture is the IETF’s new standard for a lightweight server redundancy and session failover framework to support availabili...
Xing Zhou, Thomas Dreibholz, Fu Fa, Wencai Du, Erw...
« Prev « First page 1827 / 2125 Last » Next »