Sciweavers

1538 search results - page 262 / 308
» Designing Human-Centered Distributed Information Systems
Sort
View
SIGMOD
2004
ACM
131views Database» more  SIGMOD 2004»
14 years 9 months ago
Order-Preserving Encryption for Numeric Data
Encryption is a well established technology for protecting sensitive data. However, once encrypted, data can no longer be easily queried aside from exact matches. We present an or...
Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikan...
MOBIHOC
2006
ACM
14 years 9 months ago
Data storage placement in sensor networks
Data storage has become an important issue in sensor networks as a large amount of collected data need to be archived for future information retrieval. This paper introduces stora...
Bo Sheng, Qun Li, Weizhen Mao
PDP
2010
IEEE
14 years 4 months ago
SLA-driven Elastic Cloud Hosting Provider
—It is clear that Cloud computing is and will be a sea change for the Information Technology by changing the way in which both software and hardware are designed and purchased. I...
Josep Oriol Fito, Iñigo Goiri, Jordi Guitar...
SAC
2010
ACM
14 years 4 months ago
A wavelet-based sampling algorithm for wireless sensor networks applications
This work proposes and evaluates a sampling algorithm based on wavelet transforms with Coiflets basis to reduce the data sensed in wireless sensor networks applications. The Coiï...
André L. L. de Aquino, Ricardo A. R. Olivei...
EDOC
2009
IEEE
14 years 4 months ago
Using Enterprise Architecture Management Patterns to Complement TOGAF
—The design of an Enterprise Architecture (EA) management function for an enterprise is no easy task. Various frameworks exist as well as EA management tools, which promise to de...
Sabine Buckl, Alexander M. Ernst, Florian Matthes,...