Sciweavers

82 search results - page 6 / 17
» Connection management without retaining information
Sort
View
127
Voted
OOPSLA
2010
Springer
15 years 2 months ago
Managing ambiguity in programming by finding unambiguous examples
We propose a new way to raise the level of discourse in the programming process: permit ambiguity, but manage it by linking it to unambiguous examples. This allows programming env...
Kenneth C. Arnold, Henry Lieberman
154
Voted
WWW
2003
ACM
16 years 4 months ago
Application specific data replication for edge services
The emerging edge services architecture promises to improve the availability and performance of web services by replicating servers at geographically distributed sites. A key chal...
Lei Gao, Michael Dahlin, Amol Nayate, Jiandan Zhen...
152
Voted
CIKM
2006
Springer
15 years 5 months ago
Efficient range-constrained similarity search on wavelet synopses over multiple streams
Due to the resource limitation in the data stream environment, it has been reported that answering user queries according to the wavelet synopsis of a stream is an essential abili...
Hao-Ping Hung, Ming-Syan Chen
109
Voted
CONTEXT
2007
Springer
15 years 9 months ago
Multiuser Intelligent M-learning Environment
In this article we present the architecture of an m-learning (mobile-learning) environment using Bluetooth as communications technology. We also describe its practical implementati...
Angel Moreno, Melquiades Carbajo, Bonifacio Casta&...
129
Voted
JCM
2007
143views more  JCM 2007»
15 years 3 months ago
A Simple Privacy Protecting Scheme Enabling Delegation and Ownership Transfer for RFID Tags
— RFID (Radio frequency identification) technology raises many privacy concerns among which the potential tracking of an RFID tag bearer and the eventuality of an illegitimate r...
Sepideh Fouladgar, Hossam Afifi