Sciweavers

270 search results - page 46 / 54
» Architecture Normalization for Component-based Systems
Sort
View
SIGMOD
2011
ACM
220views Database» more  SIGMOD 2011»
12 years 10 months ago
Zephyr: live migration in shared nothing databases for elastic cloud platforms
Multitenant data infrastructures for large cloud platforms hosting hundreds of thousands of applications face the challenge of serving applications characterized by small data foo...
Aaron J. Elmore, Sudipto Das, Divyakant Agrawal, A...
PERCOM
2004
ACM
14 years 7 months ago
Denial-of-Service Attacks on Battery-powered Mobile Computers
Sleep deprivation attacks are a form of denial of service attack whereby an attacker renders a pervasive computing device inoperable by draining the battery more quickly than it w...
Thomas L. Martin, Michael S. Hsiao, Dong S. Ha, Ja...
COMSWARE
2006
IEEE
14 years 1 months ago
Utilizing network features for privacy violation detection
Privacy, its violations and techniques to circumvent privacy violation have grabbed the centre-stage of both academia and industry in recent months. Corporations worldwide have be...
Jaijit Bhattacharya, Rajanish Dass, Vishal Kapoor,...
ECLIPSE
2006
ACM
14 years 1 months ago
A focused learning environment for Eclipse
The support available in Eclipse to help software developers learn complex APIs and development tools is inadequate; the support is largely passive and the support typically opera...
Izzet Safer, Gail C. Murphy, Julie Waterhouse, Jin...
MM
2004
ACM
145views Multimedia» more  MM 2004»
14 years 25 days ago
Proportional service differentiation in wireless LANs using spacing-based channel occupancy regulation
In this paper, we propose Spacing-based Channel Occupancy Regulation (SCORE) MAC protocol that provides proportional service differentiation in terms of normalized throughput in w...
Qi Xue, Aura Ganz