Sciweavers

2024 search results - page 398 / 405
» Providing Secure Environments for Untrusted Network Applicat...
Sort
View
EDBT
2004
ACM
122views Database» more  EDBT 2004»
14 years 8 months ago
Sketch-Based Multi-query Processing over Data Streams
Abstract. Recent years have witnessed an increasing interest in designing algorithms for querying and analyzing streaming data (i.e., data that is seen only once in a fixed order) ...
Alin Dobra, Minos N. Garofalakis, Johannes Gehrke,...
MOBISYS
2010
ACM
13 years 11 months ago
On the limits of effective hybrid micro-energy harvesting on mobile CRFID sensors
Mobile sensing is difficult without power. Emerging Computational RFIDs (CRFIDs) provide both sensing and generalpurpose computation without batteries--instead relying on small ca...
Jeremy Gummeson, Shane S. Clark, Kevin Fu, Deepak ...
WWW
2005
ACM
14 years 9 months ago
Hierarchical substring caching for efficient content distribution to low-bandwidth clients
While overall bandwidth in the internet has grown rapidly over the last few years, and an increasing number of clients enjoy broadband connectivity, many others still access the i...
Utku Irmak, Torsten Suel
INAP
2001
Springer
14 years 1 months ago
iML: A Logic-based Framework for Constructing Graphical User Interface on Mobile Agents
Mobile agent technology is an emerging technology that allows easier design, implementation, and maintenance of distributed systems. Mobility enables agents to reduce network load,...
Naoki Fukuta, Nobuaki Mizutani, Tadachika Ozono, T...
NAR
2006
87views more  NAR 2006»
13 years 8 months ago
From genomics to chemical genomics: new developments in KEGG
The increasing amount of genomic and molecular information is the basis for understanding higherorder biological systems, such as the cell and the 15 organism, and their interacti...
Minoru Kanehisa, Susumu Goto, Masahiro Hattori, Ki...