Sciweavers

13109 search results - page 2611 / 2622
» The design and implementation of AspectC
Sort
View
TMC
2008
159views more  TMC 2008»
14 years 10 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
JFP
2010
107views more  JFP 2010»
14 years 10 months ago
Lightweight checkpointing for concurrent ML
Transient faults that arise in large-scale software systems can often be repaired by re-executing the code in which they occur. Ascribing a meaningful semantics for safe re-execut...
Lukasz Ziarek, Suresh Jagannathan
JTAER
2010
121views more  JTAER 2010»
14 years 10 months ago
A Semantic Data Validation Service for Web Applications
An Input validation can be a critical issue. Typically, a little attention is paid to it in a web development project, because overenthusiastic validation can tend to cause failur...
Shadi Aljawarneh, Faisal Alkhateeb, Eslam Al Magha...
MANSCI
2010
94views more  MANSCI 2010»
14 years 10 months ago
Contracting for Infrequent Restoration and Recovery of Mission-Critical Systems
Firms that rely on functioning mission-critical equipment for their businesses cannot a¤ord signi…cant operational downtime due to system disruptions. To minimize the impact of...
Sang-Hyun Kim, Morris A. Cohen, Serguei Netessine,...
MMS
2010
14 years 10 months ago
Ubimedia based on readable and writable memory tags
Ubimedia is a concept where media files are embedded in everyday objects and the environment. We propose an approach where the user can read and write these files with his/her pe...
Eija Kaasinen, Marketta Niemelä, Timo Tuomist...
« Prev « First page 2611 / 2622 Last » Next »