Sciweavers

7066 search results - page 1316 / 1414
» Contact Relations with Applications
Sort
View
SPAA
2010
ACM
14 years 2 months ago
Securing every bit: authenticated broadcast in radio networks
This paper studies non-cryptographic authenticated broadcast in radio networks subject to malicious failures. We introduce two protocols that address this problem. The first, Nei...
Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zark...
ICSE
2010
IEEE-ACM
14 years 2 months ago
Using twinning to adapt programs to alternative APIs
We describe twinning and its applications to adapting programs to alternative APIs. Twinning is a simple technique that allows programmers to specify a class of program changes, i...
Marius Nita, David Notkin
MDM
2010
Springer
173views Communications» more  MDM 2010»
14 years 2 months ago
ParTAC: A Partition-Tolerant Atomic Commit Protocol for MANETs
—The support of distributed atomic transactions in mobile ad-hoc networks (MANET) is a key requirement for many mobile application scenarios. Atomicity is a fundamental property ...
Brahim Ayari, Abdelmajid Khelil, Neeraj Suri
DESRIST
2009
Springer
118views Education» more  DESRIST 2009»
14 years 2 months ago
Building theory in the sciences of the artificial
This essay extends Simon’s arguments in the Sciences of the Artificial to a critical examination of how theorizing in Information Technology disciplines should occur. The essay ...
Shirley Gregor
EDBT
2009
ACM
116views Database» more  EDBT 2009»
14 years 2 months ago
Ranking objects based on relationships and fixed associations
Text corpora are often enhanced by additional metadata which relate real-world entities, with each document in which such entities are discussed. Such relationships are typically ...
Albert Angel, Surajit Chaudhuri, Gautam Das, Nick ...
« Prev « First page 1316 / 1414 Last » Next »