Sciweavers

5758 search results - page 1099 / 1152
» Anonymity-preserving data collection
Sort
View
MOBIHOC
2005
ACM
14 years 8 months ago
Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks
Mobile sinks are needed in many sensor network applications for efficient data collection, data querying, localized sensor reprogramming, identifying and revoking compromised sens...
Wensheng Zhang, Hui Song, Sencun Zhu, Guohong Cao
ICWS
2009
IEEE
14 years 5 months ago
Reiki: Serviceability Architecture and Approach for Reduction and Management of Product Service Incidents
: © Reiki: Serviceability Architecture and Approach for Reduction and Management of Product Service Incidents Chris Connelly, Brian Cox, Tim Forell, Rui Liu, Dejan Milojicic, Alan...
Chris Connelly, Brian Cox, Tim Forell, Rui Liu, De...
PERCOM
2009
ACM
14 years 3 months ago
TreeMAC: Localized TDMA MAC Protocol for Real-time High-data-rate Sensor Networks
—Earlier sensor network MAC protocols focus on energy conservation in low-duty cycle applications, while some recent applications involve real-time high-data-rate signals. This m...
Wen-Zhan Song, Renjie Huang, Behrooz Shirazi, Rich...
IUI
2009
ACM
14 years 3 months ago
Discovering frequent work procedures from resource connections
Intelligent desktop assistants could provide more help for users if they could learn models of the users’ workflows. However, discovering desktop workflows is difficult becau...
Jianqiang Shen, Erin Fitzhenry, Thomas G. Dietteri...
PPPJ
2009
ACM
14 years 3 months ago
Phase detection using trace compilation
Dynamic compilers can optimize application code specifically for observed code behavior. Such behavior does not have to be stable across the entire program execution to be bene...
Christian Wimmer, Marcelo Silva Cintra, Michael Be...
« Prev « First page 1099 / 1152 Last » Next »