Sciweavers

3305 search results - page 536 / 661
» Can we Rely on SQL
Sort
View
IJSNET
2006
92views more  IJSNET 2006»
13 years 10 months ago
TTS: a two-tiered scheduling mechanism for energy conservation in wireless sensor networks
: In this paper, we present a two-tiered scheduling approach for effective energy conservation in wireless sensor networks. The effectiveness of this mechanism relies on dynamicall...
Nurcan Tezcan, Wenye Wang
PVLDB
2008
160views more  PVLDB 2008»
13 years 9 months ago
BayesStore: managing large, uncertain data repositories with probabilistic graphical models
Several real-world applications need to effectively manage and reason about large amounts of data that are inherently uncertain. For instance, pervasive computing applications mus...
Daisy Zhe Wang, Eirinaios Michelakis, Minos N. Gar...
DBKDA
2010
IEEE
127views Database» more  DBKDA 2010»
13 years 8 months ago
Failure-Tolerant Transaction Routing at Large Scale
—Emerging Web2.0 applications such as virtual worlds or social networking websites strongly differ from usual OLTP applications. First, the transactions are encapsulated in an AP...
Idrissa Sarr, Hubert Naacke, Stéphane Gan&c...
TPDS
2010
87views more  TPDS 2010»
13 years 8 months ago
An ISP-Friendly File Distribution Protocol: Analysis, Design, and Implementation
Abstract—In the past few years, P2P file distribution applications (e.g., BitTorrent) are becoming so popular that they are the dominating source of Internet traffic. This crea...
Minghong Lin, John C. S. Lui, Dah-Ming Chiu
ACSAC
2010
IEEE
13 years 8 months ago
Comprehensive shellcode detection using runtime heuristics
A promising method for the detection of previously unknown code injection attacks is the identification of the shellcode that is part of the attack vector using payload execution....
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...