Sciweavers

2757 search results - page 524 / 552
» On separating systems
Sort
View
IPPS
2006
IEEE
14 years 1 months ago
Honeybees: combining replication and evasion for mitigating base-station jamming in sensor networks
By violating MAC-layer protocols, the jamming attack aims at blocking successful communication among wireless nodes. Wireless sensor networks (WSNs) are highly vulnerable to jammi...
Sherif M. Khattab, Daniel Mossé, Rami G. Me...
ACMSE
2006
ACM
14 years 1 months ago
Middleware specialization using aspect oriented programming
Standardized middleware is used to build large distributed real-time and enterprise (DRE) systems. These middleware are highly flexible and support a large number of features sin...
Dimple Kaul, Aniruddha S. Gokhale
PLDI
2006
ACM
14 years 1 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
VRST
2006
ACM
14 years 1 months ago
Spatial input device structure and bimanual object manipulation in virtual environments
Complex 3D interaction tasks require the manipulation of a large number of input parameters. Spatial input devices can be constructed such that their structure reflects the task ...
Arjen van Rhijn, Jurriaan D. Mulder
ICDE
2005
IEEE
134views Database» more  ICDE 2005»
14 years 1 months ago
Index Structures for Matching XML Twigs Using Relational Query Processors
Various index structures have been proposed to speed up the evaluation of XML path expressions. However, existing XML path indices suffer from at least one of three limitations: ...
Zhiyuan Chen, Johannes Gehrke, Flip Korn, Nick Kou...