Sciweavers

856 search results - page 146 / 172
» Location Management in Pervasive Systems
Sort
View
DATE
2009
IEEE
135views Hardware» more  DATE 2009»
14 years 4 months ago
System-level hardware-based protection of memories against soft-errors
We present a hardware-based approach to improve the resilience of a computer system against the errors occurred in the main memory with the help of error detecting and correcting ...
Valentin Gherman, Samuel Evain, Mickael Cartron, N...
CIKM
2009
Springer
14 years 4 months ago
Towards non-directional Xpath evaluation in a RDBMS
XML query languages use directional path expressions to locate data in an XML data collection. They are tightly coupled to the structure of a data collection, and can fail when ev...
Sourav S. Bhowmick, Curtis E. Dyreson, Erwin Leona...
CISS
2008
IEEE
14 years 4 months ago
Resource allocation for cooperative relaying
—The delay-limited capacity of the half-duplex relay channel is analyzed for several cooperative protocols under a long-term average total transmit power constraint. It is assume...
Jie Yang, Deniz Gündüz, D. Richard Brown...
ICPADS
2008
IEEE
14 years 4 months ago
Textures in Second Life: Measurement and Analysis
We collected packet traces from Second Life client sessions and analyzed the packet contents. We observed that textures constitute a majority of the network traffic. We further c...
Huiguang Liang, Mehul Motani, Wei Tsang Ooi
SSDBM
2008
IEEE
107views Database» more  SSDBM 2008»
14 years 4 months ago
ProUD: Probabilistic Ranking in Uncertain Databases
There are a lot of application domains, e.g. sensor databases, traffic management or recognition systems, where objects have to be compared based on vague and uncertain data. Feat...
Thomas Bernecker, Hans-Peter Kriegel, Matthias Ren...