Sciweavers

5544 search results - page 982 / 1109
» Three Inadequate Models
Sort
View
MOBIQUITOUS
2008
IEEE
15 years 4 months ago
Context-aware fault tolerance in migratory services
Mobile ad hoc networks can be leveraged to provide ubiquitous services capable of acquiring, processing, and sharing real-time information from the physical world. Unlike Internet...
Oriana Riva, Josiane Nzouonta, Cristian Borcea
FOCS
2007
IEEE
15 years 4 months ago
Parameterized Proof Complexity
We propose a proof-theoretic approach for gaining evidence that certain parameterized problems are not fixedparameter tractable. We consider proofs that witness that a given prop...
Stefan S. Dantchev, Barnaby Martin, Stefan Szeider
ICRA
2007
IEEE
138views Robotics» more  ICRA 2007»
15 years 4 months ago
Teleoperation of Steerable Needles
— Needles are commonly used in medical practice as a minimally invasive means to reach subsurface targets for diagnosis or therapy delivery. Recent results indicate that steerabl...
Joseph M. Romano, Robert J. Webster III, Allison M...
IPCCC
2007
IEEE
15 years 4 months ago
Optimising Networks Against Malware
Rapidly-spreading malicious software is an important threat on today’s computer networks. Most solutions that have been proposed to counter this threat are based on our ability ...
Pierre-Marc Bureau, José M. Fernandez
82
Voted
BTW
2007
Springer
164views Database» more  BTW 2007»
15 years 4 months ago
Ruminations on Multi-Tenant Databases
: This is a position paper on multi-tenant databases. As motivation, it first describes the emerging marketplace of hosted enterprise services and the importance of using multi-ten...
Dean Jacobs, Stefan Aulbach