Sciweavers

1874 search results - page 309 / 375
» Network optimization for DHT-based applications
Sort
View
122
Voted
CCS
2006
ACM
15 years 6 months ago
Secure attribute-based systems
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional attribute architectures and cryptosystems are ill-equipped to provide security ...
Matthew Pirretti, Patrick Traynor, Patrick McDanie...
130
Voted
BDA
2003
15 years 4 months ago
Memory Requirements for Query Execution in Highly Constrained Devices
Pervasive computing introduces data management requirements that must be tackled in a growingvariety of lightweight computing devices. Personal folders on chip, networks of sensor...
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral
202
Voted
SIGMOD
2005
ACM
139views Database» more  SIGMOD 2005»
16 years 2 months ago
Distributed operation in the Borealis stream processing engine
Borealis is a distributed stream processing engine that is being developed at Brandeis University, Brown University, and MIT. Borealis inherits core stream processing functionalit...
Yanif Ahmad, Bradley Berg, Ugur Çetintemel,...
114
Voted
DCC
2008
IEEE
16 years 2 months ago
Dimension Reduction and Expansion: Distributed Source Coding in a Noisy Environment
We studied the problem of distributed coding and transmission of intercorrelated sources with memory. Different from the conventional distributed source coding structure which rel...
Anna N. Kim, Fredrik Hekland
150
Voted
GLOBECOM
2009
IEEE
15 years 9 months ago
Strong Barrier Coverage with Directional Sensors
Abstract—The barrier coverage model was proposed for applications in which sensors are deployed for intrusion detection. In this paper, we study a strong barrier coverage problem...
Li Zhang, Jian Tang, Weiyi Zhang