Sciweavers

2853 search results - page 549 / 571
» On the Efficiency of Provenance Queries
Sort
View
PVLDB
2008
110views more  PVLDB 2008»
13 years 8 months ago
Online maintenance of very large random samples on flash storage
Recent advances in flash media have made it an attractive alternative for data storage in a wide spectrum of computing devices, such as embedded sensors, mobile phones, PDA's...
Suman Nath, Phillip B. Gibbons
JIDM
2010
155views more  JIDM 2010»
13 years 7 months ago
DeweyIDs - The Key to Fine-Grained Management of XML Documents
Because XML documents tend to be very large and are more and more collaboratively processed, their fine-grained storage and management is a must for which, in turn, a flexible tree...
Michael Peter Haustein, Theo Härder, Christia...
TPDS
2010
199views more  TPDS 2010»
13 years 6 months ago
Flexible Cache Consistency Maintenance over Wireless Ad Hoc Networks
—One of the major applications of wireless ad hoc networks is to extend the Internet coverage and support pervasive and efficient data dissemination and sharing. To reduce data a...
Yu Huang 0002, Jiannong Cao, Beihong Jin, XianPing...
WISEC
2010
ACM
13 years 6 months ago
Preventing multi-query attack in location-based services
Despite increasing popularity, Location-based Services (LBS) (e.g., searching nearby points-of-interest on map) on mobile handheld devices have been subject to major privacy conce...
Nilothpal Talukder, Sheikh Iqbal Ahamed
ICCAD
2009
IEEE
161views Hardware» more  ICCAD 2009»
13 years 6 months ago
The epsilon-approximation to discrete VT assignment for leakage power minimization
As VLSI technology reaches 45nm technology node, leakage power optimization has become a major design challenge. Threshold voltage (vt) assignment has been extensively studied, du...
Yujia Feng, Shiyan Hu