Sciweavers

3994 search results - page 710 / 799
» Supporting the design of network-spanning applications
Sort
View
VLDB
2007
ACM
128views Database» more  VLDB 2007»
16 years 1 months ago
Automating the Detection of Snapshot Isolation Anomalies
Snapshot isolation (SI) provides significantly improved concurrency over 2PL, allowing reads to be non-blocking. Unfortunately, it can also lead to non-serializable executions in ...
Sudhir Jorwekar, Alan Fekete, Krithi Ramamritham, ...
MOBISYS
2007
ACM
16 years 1 months ago
Real-time deployment of multihop relays for range extension
When the range of single-hop wireless communication is limited by distance or harsh radio propagation conditions, relays can be used to extend the communication range through mult...
Michael R. Souryal, Johannes Geissbuehler, Leonard...
IDTRUST
2009
ACM
15 years 8 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea
SENSYS
2009
ACM
15 years 8 months ago
TOSThreads: thread-safe and non-invasive preemption in TinyOS
Many threads packages have been proposed for programming wireless sensor platforms. However, many sensor network operating systems still choose to provide an eventdriven model, du...
Kevin Klues, Chieh-Jan Mike Liang, Jeongyeup Paek,...
SENSYS
2009
ACM
15 years 8 months ago
Darjeeling, a feature-rich VM for the resource poor
The programming and retasking of sensor nodes could benefit greatly from the use of a virtual machine (VM) since byte code is compact, can be loaded on demand, and interpreted on...
Niels Brouwers, Koen Langendoen, Peter Corke