Sciweavers

492 search results - page 93 / 99
» Impact of Limited Memory Resources
Sort
View
PE
2002
Springer
158views Optimization» more  PE 2002»
13 years 7 months ago
Comparison of inter-area rekeying algorithms for secure wireless group communications
Many emerging mobile wireless applications depend upon secure group communications, in which data is encrypted and the group's data encryption key is changed whenever a membe...
Chun Zhang, Brian DeCleene, James F. Kurose, Donal...
HOTNETS
2010
13 years 2 months ago
Diagnosing mobile applications in the wild
There are a lot of applications that run on modern mobile operating systems. Inevitably, some of these applications fail in the hands of users. Diagnosing a failure to identify the...
Sharad Agarwal, Ratul Mahajan, Alice Zheng, Victor...
VLC
2010
156views more  VLC 2010»
13 years 2 months ago
Visual instructional design languages
Submission Deadline: December 14, 2009 The Journal of Visual Languages and Computing (http://www.elsevier.com/locate/jvlc, impact factor: 0.863) invites authors to submit papers fo...
Manuel Caeiro Rodríguez, Michael Derntl, Lu...
EXPERT
2007
109views more  EXPERT 2007»
13 years 7 months ago
Mexar2: AI Solves Mission Planner Problems
s planners work at a higher abstraction level while it performs low-level, often-repetitive tasks. It also helps them produce a plan rapidly, explore alternative solutions, and cho...
Amedeo Cesta, Gabriella Cortellessa, Michel Denis,...
ICDE
2008
IEEE
190views Database» more  ICDE 2008»
14 years 9 months ago
Adaptive Segmentation for Scientific Databases
In this paper we explore database segmentation in the context of a column-store DBMS targeted at a scientific database. We present a novel hardware- and scheme-oblivious segmentati...
Milena Ivanova, Martin L. Kersten, Niels Nes