Sciweavers

1004 search results - page 180 / 201
» Safe Constraint Queries
Sort
View
ICCSA
2007
Springer
14 years 2 months ago
Provably Secure Framework for Information Aggregation in Sensor Networks
Information aggregation is an important operation in wireless sensor networks executed for the purpose of monitoring and reporting of the environmental data. Due to the performance...
Mark Manulis, Jörg Schwenk
PPDP
2007
Springer
14 years 2 months ago
Interactive, scalable, declarative program analysis: from prototype to implementation
Static analyses provide the semantic foundation for tools ranging from optimizing compilers to refactoring browsers and advanced debuggers. Unfortunately, developing new analysis ...
William C. Benton, Charles N. Fischer
CAMP
2005
IEEE
14 years 2 months ago
Reinforcement Learning for P2P Searching
— For a peer-to-peer (P2P) system holding massive amount of data, an efficient and scalable search for resource sharing is a key determinant to its practical usage. Unstructured...
Luca Gatani, Giuseppe Lo Re, Alfonso Urso, Salvato...
ICAC
2005
IEEE
14 years 2 months ago
A Mass Storage System Administrator Autonomic Assistant
System administrators of today’s high performance computing systems are generally responsible for managing the large amounts of data traffic and archival querying that mass stor...
Milton Halem, Randy Schauer
WOWMOM
2005
ACM
240views Multimedia» more  WOWMOM 2005»
14 years 2 months ago
An Adaptive Routing Protocol for Ad Hoc Peer-to-Peer Networks
Ad hoc networks represent a key factor in the evolution of wireless communications. These networks typically consist of equal nodes that communicate without central control, inter...
Luca Gatani, Giuseppe Lo Re, Salvatore Gaglio