Sciweavers

18697 search results - page 3731 / 3740
» Systemic Security Management
Sort
View
PE
2010
Springer
102views Optimization» more  PE 2010»
14 years 10 months ago
Extracting state-based performance metrics using asynchronous iterative techniques
Solution of large sparse linear fixed-point problems lies at the heart of many important performance analysis calculations. These calculations include steady-state, transient and...
Douglas V. de Jager, Jeremy T. Bradley
PERCOM
2010
ACM
14 years 10 months ago
Sensor.Network: An open data exchange for the web of things
Abstract—Tiny, wireless, sensors embedded in a large number of Internet-capable devices–smart phones, cameras, cars, toys, medical instruments, home appliances and energy meter...
Vipul Gupta, Arshan Poursohi, Poornaprajna Udupi
PVLDB
2010
342views more  PVLDB 2010»
14 years 10 months ago
CRIUS: User-Friendly Database Design
Non-technical users are increasingly adding structures to their data. This gives rise to the need for database design. However, traditional database design is deliberate and heavy...
Li Qian, Kristen LeFevre, H. V. Jagadish
TKDE
2010
152views more  TKDE 2010»
14 years 10 months ago
Maintaining Recursive Views of Regions and Connectivity in Networks
— The data management community has recently begun to consider declarative network routing and distributed acquisition: e.g., sensor networks that execute queries about contiguou...
Mengmeng Liu, Nicholas E. Taylor, Wenchao Zhou, Za...
TMC
2010
130views more  TMC 2010»
14 years 10 months ago
SYNAPSE++: Code Dissemination in Wireless Sensor Networks Using Fountain Codes
—This paper presents SYNAPSE++, a system for over the air reprogramming of wireless sensor networks (WSNs). In contrast to previous solutions, which implement plain negative ackn...
Michele Rossi, Nicola Bui, Giovanni Zanca, Luca St...
« Prev « First page 3731 / 3740 Last » Next »