Sciweavers

1061 search results - page 189 / 213
» Integrity Constraints for Linked Data
Sort
View
ICC
2007
IEEE
130views Communications» more  ICC 2007»
14 years 4 months ago
A Novel Key Redistribution Scheme for Wireless Sensor Networks
— Key management has long been a challenging problem in wireless Distributed Sensor Networks (DSNs) due to their high security requirements and strict resource constraints. Recen...
Chun-Fai Law, Ka-Shun Hung, Yu-Kwong Kwok
ICDCSW
2007
IEEE
14 years 4 months ago
Exploiting Gossip for Self-Management in Scalable Event Notification Systems
1 Challenges of scale have limited the development of event notification systems with strong properties, despite the urgent demand for consistency, reliability, security, and other...
Ken Birman, Anne-Marie Kermarrec, Krzysztof Ostrow...
ECLIPSE
2006
ACM
14 years 3 months ago
XPlainer-Eclipse: explaining XPath within Eclipse
The popularity of XML has motivated the development of novel XML processing tools many of which embed the XPath language for XML querying, transformation, constraint specificatio...
John W. S. Liu, Mariano P. Consens, Flavio Rizzolo
VALUETOOLS
2006
ACM
113views Hardware» more  VALUETOOLS 2006»
14 years 3 months ago
Load prediction models in web-based systems
Run-time management of modern Web-based services requires the integration of several algorithms and mechanisms for job dispatching, load sharing, admission control, overload detec...
Mauro Andreolini, Sara Casolari
CVPR
2010
IEEE
14 years 3 months ago
Multi-Target Tracking by On-Line Learned Discriminative Appearance Models
We present an approach for online learning of discriminative appearance models for robust multi-target tracking in a crowded scene from a single camera. Although much progress has...
Cheng-Hao Kuo, Chang Huang, Ram Nevatia