Sciweavers

14190 search results - page 2570 / 2838
» computing 2008
Sort
View
143
Voted
SSDBM
2008
IEEE
101views Database» more  SSDBM 2008»
15 years 10 months ago
Scalable Ubiquitous Data Access in Clustered Sensor Networks
Wireless sensor networks have drawn much attention due to their ability to monitor ecosystems and wildlife habitats. In such systems, the data should be intelligently collected to ...
Yueh-Hua Lee, Alex Thomo, Kui Wu, Valerie King
SSDBM
2008
IEEE
177views Database» more  SSDBM 2008»
15 years 10 months ago
Prioritized Evaluation of Continuous Moving Queries over Streaming Locations
Abstract. Existing approaches to the management of streaming positional updates generally assume that all active user requests have equal importance, ignoring the possibility of an...
Kostas Patroumpas, Timos K. Sellis
129
Voted
TASE
2008
IEEE
15 years 10 months ago
Bounded Model Checking of Compositional Processes
Verification techniques like SAT-based bounded model checking have been successfully applied to a variety of system models. Applying bounded model checking to compositional proce...
Jun Sun 0001, Yang Liu 0003, Jin Song Dong, Jing S...
TPHOL
2008
IEEE
15 years 10 months ago
A Type of Partial Recursive Functions
We describe a new method to represent (partial) recursive functions in type theory. For every recursive definition, we define a co-inductive type of prophecies that characterises...
Ana Bove, Venanzio Capretta
247
Voted
VL
2008
IEEE
171views Visual Languages» more  VL 2008»
15 years 10 months ago
Usability challenges for enterprise service-oriented architecture APIs
An important part of many programming tasks is the use of libraries and other forms of Application Programming Interfaces (APIs). Programming via web services using a Service-Orie...
Jack Beaton, Sae Young Jeong, Yingyu Xie, Jeffrey ...
« Prev « First page 2570 / 2838 Last » Next »