Sciweavers

287 search results - page 53 / 58
» Audio authentication based on distributed source coding
Sort
View
146
Voted
WIOPT
2010
IEEE
15 years 18 days ago
Lifetime optimization for wireless sensor networks with correlated data gathering
—The nodes in wireless sensor networks often collect correlated measurements. Not taking into account this information redundancy is detrimental to the network lifetime, since co...
Nashat Abughalieh, Yann-Aël Le Borgne, Kris S...
137
Voted
ICSE
2010
IEEE-ACM
15 years 6 days ago
Syde: a tool for collaborative software development
Team collaboration is essential for the success of multi-developer projects. When team members are spread across different locations, individual awareness of the activity of other...
Lile Hattori, Michele Lanza
225
Voted
ASPLOS
2009
ACM
16 years 2 months ago
ASSURE: automatic software self-healing using rescue points
Software failures in server applications are a significant problem for preserving system availability. We present ASSURE, a system that introduces rescue points that recover softw...
Stelios Sidiroglou, Oren Laadan, Carlos Perez, Nic...
VEE
2006
ACM
126views Virtualization» more  VEE 2006»
15 years 8 months ago
A new approach to real-time checkpointing
The progress towards programming methodologies that simplify the work of the programmer involves automating, whenever possible, activities that are secondary to the main task of d...
Antonio Cunei, Jan Vitek
SENSYS
2003
ACM
15 years 7 months ago
On the scaling laws of dense wireless sensor networks
We consider dense wireless sensor networks deployed to observe arbitrary random fields. The requirement is to reconstruct an estimate of the random field at a certain collector ...
Praveen Kumar Gopala, Hesham El Gamal