Sciweavers

9325 search results - page 1748 / 1865
» The decentralized implementability problem
Sort
View
123
Voted
VLDB
2005
ACM
126views Database» more  VLDB 2005»
15 years 9 months ago
Consistently Estimating the Selectivity of Conjuncts of Predicates
Cost-based query optimizers need to estimate the selectivity of conjunctive predicates when comparing alternative query execution plans. To this end, advanced optimizers use multi...
Volker Markl, Nimrod Megiddo, Marcel Kutsch, Tam M...
VSTTE
2005
Springer
15 years 9 months ago
It Is Time to Mechanize Programming Language Metatheory
How close are we to a world in which mechanically verified software is commonplace? A world in which theorem proving technology is used routinely by both software developers and p...
Benjamin C. Pierce, Peter Sewell, Stephanie Weiric...
131
Voted
CASES
2004
ACM
15 years 9 months ago
Hardware assisted control flow obfuscation for embedded processors
+ With more applications being deployed on embedded platforms, software protection becomes increasingly important. This problem is crucial on embedded systems like financial transa...
Xiaotong Zhuang, Tao Zhang, Hsien-Hsin S. Lee, San...
CSCW
2004
ACM
15 years 9 months ago
Augmenting the social space of an academic conference
Academic conferences provide a social space for people to present their work, learn about others’ work, and interact informally with one another. However, opportunities for inte...
Joseph F. McCarthy, David W. McDonald, Suzanne Sor...
133
Voted
DIALM
2004
ACM
124views Algorithms» more  DIALM 2004»
15 years 9 months ago
Localized techniques for broadcasting in wireless sensor networks
We present three localized techniques for broadcasting in large scale ad hoc networks, i.e., for the problem of disseminating a message from a source node to all the nodes in the ...
Lorenzo Orecchia, Alessandro Panconesi, Chiara Pet...
« Prev « First page 1748 / 1865 Last » Next »