Sciweavers

1457 search results - page 193 / 292
» Privacy Challenges for Database Systems
Sort
View
CSREASAM
2008
15 years 4 months ago
Secure Resource Sharing in Ad hoc Networks
Abstract Mobile and wireless devices become more popular and their capabilities increase as well. At the same time, most of the today's PC power is unused, as a study of the G...
Michaela Greiler, Peter Schartner
146
Voted
WWW
2003
ACM
16 years 3 months ago
Application specific data replication for edge services
The emerging edge services architecture promises to improve the availability and performance of web services by replicating servers at geographically distributed sites. A key chal...
Lei Gao, Michael Dahlin, Amol Nayate, Jiandan Zhen...
112
Voted
DMSN
2006
ACM
15 years 8 months ago
Transactional issues in sensor data management
This paper presents a novel research direction in the field of sensor data management. It concerns transactional support in heterogeneous large scale sensor systems. Besides well...
Levent Gürgen, Claudia Roncancio, Cyril Labb&...
140
Voted
COMPSEC
2004
105views more  COMPSEC 2004»
15 years 2 months ago
Rico: a security proxy for mobile code
Security technology suitable for the burgeoning embedded system market has not been widespread. Untrusted code downloaded from the Internet poses numerous security risks due to th...
Yougang Song, Brett D. Fleisch
148
Voted
OOPSLA
2009
Springer
15 years 9 months ago
Debug all your code: portable mixed-environment debugging
Programmers build large-scale systems with multiple languages to reuse legacy code and leverage languages best suited to their problems. For instance, the same program may use Jav...
Byeongcheol Lee, Martin Hirzel, Robert Grimm, Kath...