Sciweavers

19776 search results - page 3753 / 3956
» Architecture of a Database System
Sort
View
CCS
2008
ACM
15 years 6 months ago
Location privacy of distance bounding protocols
Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As...
Kasper Bonne Rasmussen, Srdjan Capkun
AICT
2006
IEEE
225views Communications» more  AICT 2006»
15 years 6 months ago
Migration to 4 G: Mobile IP based Solutions
Fourth Generation (4G) is the next generation of wireless networks that will replace third Generation (3G) networks sometimes in future. 4G is intended to provide high speed, high...
K. R. Santhi, G. Senthil Kumaran
147
Voted
ECOOP
2008
Springer
15 years 5 months ago
Programming with Live Distributed Objects
A component revolution is underway, bringing developers improved productivity and opportunities for code reuse. However, whereas existing tools work well for builders of desktop ap...
Krzysztof Ostrowski, Ken Birman, Danny Dolev, Jong...
MASCOTS
2010
15 years 5 months ago
EntomoModel: Understanding and Avoiding Performance Anomaly Manifestations
Subtle implementation errors or mis-configurations in complex Internet services may lead to performance degradations without causing failures. These undiscovered performance anomal...
Christopher Stewart, Kai Shen, Arun Iyengar, Jian ...
ICAI
2008
15 years 5 months ago
Nonrestrictive Concept-Acquisition by Representational Redescription
coarse procedures or very abstract frames from the point of view of algorithm, because some crucial issues like the representation, evolution, storage, and learning process of conc...
Hui Wei, Yan Chen
« Prev « First page 3753 / 3956 Last » Next »