Sciweavers

3516 search results - page 670 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
WWW
2007
ACM
14 years 9 months ago
Towards Deeper Understanding of the Search Interfaces of the Deep Web
Many databases have become Web-accessible through form-based search interfaces (i.e., HTML forms) that allow users to specify complex and precise queries to access the underlying ...
Hai He, Weiyi Meng, Yiyao Lu, Clement T. Yu, Zongh...
SIGMOD
2008
ACM
205views Database» more  SIGMOD 2008»
14 years 9 months ago
Monochromatic and bichromatic reverse skyline search over uncertain databases
Reverse skyline queries over uncertain databases have many important applications such as sensor data monitoring and business planning. Due to the existence of uncertainty in many...
Xiang Lian, Lei Chen 0002
EWSN
2004
Springer
14 years 8 months ago
Lessons from a Sensor Network Expedition
Habitat monitoring is an important driving application for wireless sensor networks (WSNs). Although researchers anticipate some challenges arising in the real-world deployments of...
Robert Szewczyk, Joseph Polastre, Alan M. Mainwari...
HICSS
2009
IEEE
173views Biometrics» more  HICSS 2009»
14 years 3 months ago
Effects of Task Types and Communication Support Tools on E-Negotiation Performance: A Task-Technology Fit Perspective
The rapid growth of the Internet has made computer-mediated communication popular and the use of e-negotiation systems (ENS) has attracted great attention from researchers and pra...
Her-Sen Doong, Hui-Chih Wang, Chi-Kuang Hsieh
ASPLOS
2006
ACM
14 years 2 months ago
Tartan: evaluating spatial computation for whole program execution
Spatial Computing (SC) has been shown to be an energy-efficient model for implementing program kernels. In this paper we explore the feasibility of using SC for more than small k...
Mahim Mishra, Timothy J. Callahan, Tiberiu Chelcea...