Sciweavers

6229 search results - page 1242 / 1246
» Models of Computation for Networks on Chip
Sort
View
ICDE
2007
IEEE
148views Database» more  ICDE 2007»
14 years 9 months ago
Efficient Detection of Distributed Constraint Violations
In many distributed environments, the primary function of monitoring software is to detect anomalies, that is, instances when system behavior deviates substantially from the norm....
Shipra Agrawal, Supratim Deb, K. V. M. Naidu, Raje...
SIGMOD
2008
ACM
191views Database» more  SIGMOD 2008»
14 years 7 months ago
Efficient aggregation for graph summarization
Graphs are widely used to model real world objects and their relationships, and large graph datasets are common in many application domains. To understand the underlying character...
Yuanyuan Tian, Richard A. Hankins, Jignesh M. Pate...
WWW
2010
ACM
14 years 2 months ago
Smart caching for web browsers
In modern Web applications, style formatting and layout calculation often account for a substantial amount of local Web page processing time. In this paper1 , we present two novel...
Kaimin Zhang, Lu Wang, Aimin Pan, Bin Benjamin Zhu
INFOCOM
2008
IEEE
14 years 1 months ago
Power-Adjusted Random Access to a Wireless Channel
—The operation of widely-deployed random access to wireless networks is based on limited information on the result of each access attempt. When making a random access attempt, us...
Young-June Choi, Kang G. Shin
POLICY
2005
Springer
14 years 1 months ago
Enhancing Web Privacy Protection through Declarative Policies
The Platform for Privacy Preferences (P3P) is a W3C framework for web privacy management. It provides a standard vocabulary that websites can use to describe their privacy practic...
Pranam Kolari, Li Ding, Shashidhara Ganjugunte, An...
« Prev « First page 1242 / 1246 Last » Next »