Sciweavers

327 search results - page 45 / 66
» Access and Use Control using Externally Controlled Reference...
Sort
View
IC3
2009
13 years 8 months ago
IDChase: Mitigating Identifier Migration Trap in Biological Databases
A convenient mechanism to refer to large biological objects such as sequences, structures and networks is the use of identifiers or handles, commonly called IDs. IDs function as a ...
Anupam Bhattacharjee, Aminul Islam, Hasan M. Jamil...
FUN
2010
Springer
263views Algorithms» more  FUN 2010»
14 years 3 months ago
Fighting Censorship with Algorithms
In countries such as China or Iran where Internet censorship is prevalent, users usually rely on proxies or anonymizers to freely access the web. The obvious difficulty with this a...
Mohammad Mahdian
PERCOM
2009
ACM
14 years 5 months ago
Implementation of a MAC Protocol for QoS Support in Wireless Sensor Networks
— Future application areas of wireless sensor networks (WSNs) may include industrial process automation, aircraft control systems or patient monitoring in hospitals. Such applica...
Petcharat Suriyachai, Utz Roedig, Andrew Scott
ICCD
2008
IEEE
167views Hardware» more  ICCD 2008»
14 years 4 months ago
Exploiting spare resources of in-order SMT processors executing hard real-time threads
— We developed an SMT processor that allows a static WCET analysis of several hard real-time threads and uses the remaining resources for soft or non real-time threads. The analy...
Jörg Mische, Sascha Uhrig, Florian Kluge, The...
CCS
2006
ACM
14 years 1 months ago
TinySeRSync: secure and resilient time synchronization in wireless sensor networks
Accurate and synchronized time is crucial in many sensor network applications due to the need for consistent distributed sensing and coordination. In hostile environments where an...
Kun Sun, Peng Ning, Cliff Wang