Sciweavers

279 search results - page 24 / 56
» 20 Years of ECM
Sort
View
WISEC
2010
ACM
14 years 2 months ago
Providing security with insecure systems
Abstract A Martian who arrived on Earth today would surely conclude that computing and communications security are in a crisis situation. The popular media as well as technical pub...
Andrew M. Odlyzko
EWSN
2009
Springer
14 years 8 months ago
Sundial: Using Sunlight to Reconstruct Global Timestamps
Abstract. This paper investigates postmortem timestamp reconstruction in environmental monitoring networks. In the absence of a timesynchronization protocol, these networks use mul...
Jayant Gupchup, Razvan Musaloiu-Elefteri, Alexande...
SIGMOD
2005
ACM
159views Database» more  SIGMOD 2005»
14 years 7 months ago
System RX: One Part Relational, One Part XML
This paper describes the overall architecture and design aspects of a hybrid relational and XML database system called System RX. We believe that such a system is fundamental in t...
Kevin S. Beyer, Roberta Cochrane, Vanja Josifovski...
ICFP
2005
ACM
14 years 7 months ago
The anatomy of a loop: a story of scope and control
Writing loops with tail-recursive function calls is the equivalent of writing them with goto's. Given that loop packages for Lisp-family languages have been around for over 2...
Olin Shivers
ICDCS
2009
IEEE
14 years 4 months ago
QVS: Quality-Aware Voice Streaming for Wireless Sensor Networks
Recent years have witnessed the pilot deployments of audio or low-rate video wireless sensor networks for a class of mission-critical applications including search and rescue, sec...
Liqun Li, Guoliang Xin, Limin Sun, Yan Liu