Sciweavers

4564 search results - page 868 / 913
» Data Integration Using ID-Logic
Sort
View
IPSN
2007
Springer
14 years 2 months ago
Harbor: software-based memory protection for sensor nodes
Many sensor nodes contain resource constrained microcontrollers where user level applications, operating system components, and device drivers share a single address space with no...
Ram Kumar, Eddie Kohler, Mani B. Srivastava
IPSN
2007
Springer
14 years 2 months ago
Lucid dreaming: reliable analog event detection for energy-constrained applications
— Existing sensor network architectures are based on the assumption that data will be polled. Therefore, they are not adequate for long-term battery-powered use in applications t...
Sasha Jevtic, Mathew Kotowsky, Robert P. Dick, Pet...
SEMWEB
2007
Springer
14 years 2 months ago
JeromeDL - a Semantic Digital Library
Abstract. JeromeDL is a Semantic Digital Library engine. It uses Semantic Web and Social Networking technologies to improve browsing and searching for resources. With JeromeDL’s ...
Sebastian Ryszard Kruk, Tomasz Woroniecki, Adam Gz...
WS
2006
ACM
14 years 2 months ago
Proactive security for mobile messaging networks
The interoperability of IM (Instant Messaging) and SMS (Short Messaging Service) networks allows users to seamlessly use a variety of computing devices from desktops to cellular p...
Abhijit Bose, Kang G. Shin
CODES
2005
IEEE
14 years 2 months ago
SOMA: a tool for synthesizing and optimizing memory accesses in ASICs
Arbitrary memory dependencies and variable latency memory systems are major obstacles to the synthesis of large-scale ASIC systems in high-level synthesis. This paper presents SOM...
Girish Venkataramani, Tiberiu Chelcea, Seth Copen ...