Sciweavers

404 search results - page 54 / 81
» Querying Data under Access Limitations
Sort
View
JIDM
2010
155views more  JIDM 2010»
13 years 6 months ago
DeweyIDs - The Key to Fine-Grained Management of XML Documents
Because XML documents tend to be very large and are more and more collaboratively processed, their fine-grained storage and management is a must for which, in turn, a flexible tree...
Michael Peter Haustein, Theo Härder, Christia...
IADIS
2003
13 years 9 months ago
Improving Internet Research Methods: A Web Laboratory
We describe the current state of a resource that enables research in the human sciences with differential access rights for experimenters and participants in experiments. We outli...
Maria Buckley, Carl Vogel
JSAC
2011
215views more  JSAC 2011»
13 years 2 months ago
Opportunistic Spectrum Sharing Schemes for CDMA-Based Uplink MAC in Cognitive Radio Networks
—We consider a wireless cognitive radio network in which a set of secondary users (SUs) opportunistically utilize the wireless spectrum licensed to the primary users (PUs) to tra...
Xi Zhang, Hang Su
DMSN
2006
ACM
13 years 11 months ago
Efficient handling of sensor failures
Sensors provide unprecedented access to a wealth of information from the physical environment in real-time. However, they suffer from a variety of resource limitations, most impor...
Andreea Berfield, Panos K. Chrysanthis, Alexandros...
VLDB
2001
ACM
119views Database» more  VLDB 2001»
14 years 8 months ago
PicoDBMS: Scaling down database techniques for the smartcard
Smartcards are the most secure portable computing device today. They have been used successfully in applications involving money, proprietary and personal data (such as banking, h...
Philippe Pucheral, Luc Bouganim, Patrick Valduriez...