Sciweavers

13109 search results - page 2611 / 2622
» The design and implementation of AspectC
Sort
View
104
Voted
TMC
2008
159views more  TMC 2008»
14 years 8 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
JFP
2010
107views more  JFP 2010»
14 years 8 months ago
Lightweight checkpointing for concurrent ML
Transient faults that arise in large-scale software systems can often be repaired by re-executing the code in which they occur. Ascribing a meaningful semantics for safe re-execut...
Lukasz Ziarek, Suresh Jagannathan
JTAER
2010
121views more  JTAER 2010»
14 years 8 months ago
A Semantic Data Validation Service for Web Applications
An Input validation can be a critical issue. Typically, a little attention is paid to it in a web development project, because overenthusiastic validation can tend to cause failur...
Shadi Aljawarneh, Faisal Alkhateeb, Eslam Al Magha...
MANSCI
2010
94views more  MANSCI 2010»
14 years 8 months ago
Contracting for Infrequent Restoration and Recovery of Mission-Critical Systems
Firms that rely on functioning mission-critical equipment for their businesses cannot a¤ord signi…cant operational downtime due to system disruptions. To minimize the impact of...
Sang-Hyun Kim, Morris A. Cohen, Serguei Netessine,...
MMS
2010
14 years 8 months ago
Ubimedia based on readable and writable memory tags
Ubimedia is a concept where media files are embedded in everyday objects and the environment. We propose an approach where the user can read and write these files with his/her pe...
Eija Kaasinen, Marketta Niemelä, Timo Tuomist...
« Prev « First page 2611 / 2622 Last » Next »