Sciweavers

5220 search results - page 136 / 1044
» Changing Persistent Applications
Sort
View
JCO
2006
66views more  JCO 2006»
15 years 4 months ago
Tree edge decomposition with an application to minimum ultrametric tree approximation
A k-decomposition of a tree is a process in which the tree is recursively partitioned into k edge-disjoint subtrees until each subtree contains only one edge. We investigated the p...
Chia-Mao Huang, Bang Ye Wu, Chang-Biau Yang
ICASSP
2011
IEEE
14 years 8 months ago
Efficient discrete fractional Hirschman optimal transform and its application
All of the existing N-point discrete fractional signal transforms require O(N2 ) computation complexity. In this paper, we propose a new discrete fractional signal transform whose...
Wen-Liang Hsue, Soo-Chang Pei, Jian-Jiun Ding
WWW
2004
ACM
16 years 5 months ago
A semantic matchmaker service on the grid
A fundamental task on the Grid is to decide what jobs to run on what computing resources based on job or application requirements. Our previous work on ontology-based matchmaking ...
Andreas Harth, Stefan Decker, Yu He, Hongsuda Tang...
SOSP
2009
ACM
16 years 1 months ago
Surviving sensor network software faults
We describe Neutron, a version of the TinyOS operating system that efficiently recovers from memory safety bugs. Where existing schemes reboot an entire node on an error, Neutron...
Yang Chen, Omprakash Gnawali, Maria A. Kazandjieva...
ACSAC
2005
IEEE
15 years 10 months ago
A Nitpicker's guide to a minimal-complexity secure GUI
Malware such as Trojan Horses and spyware remain to be persistent security threats that exploit the overly complex graphical user interfaces of today’s commodity operating syste...
Norman Feske, Christian Helmuth