Sciweavers

12637 search results - page 2447 / 2528
» Security for Extensible Systems
Sort
View
ICFP
2001
ACM
14 years 10 months ago
Recursive Structures for Standard ML
Standard ML is a statically typed programming language that is suited for the construction of both small and large programs. "Programming in the small" is captured by St...
Claudio V. Russo
ICDE
2010
IEEE
197views Database» more  ICDE 2010»
14 years 9 months ago
Monitoring Continuous State Violation in Datacenters: Exploring the Time Dimension
Monitoring global states of an application deployed over distributed nodes becomes prevalent in today's datacenters. State monitoring requires not only correct monitoring resu...
Shicong Meng, Ting Wang, Ling Liu
PERCOM
2005
ACM
14 years 9 months ago
TinyLIME: Bridging Mobile and Sensor Networks through Middleware
In the rapidly developing field of sensor networks, bridging the gap between the applications and the hardware presents a major challenge. Although middleware is one solution, it ...
Carlo Curino, Matteo Giani, Marco Giorgetta, Aless...
MOBISYS
2008
ACM
14 years 9 months ago
Symphony: synchronous two-phase rate and power control in 802.11 wlans
Adaptive transmit power control in 802.11 Wireless LANs (WLANs) on a per-link basis helps increase network capacity and improves battery life of Wifi-enabled mobile devices. Howev...
Kishore Ramachandran, Ravi Kokku, Honghai Zhang, M...
MOBIHOC
2008
ACM
14 years 9 months ago
Localized distance-sensitive service discovery in wireless sensor networks
In this paper, we identify a new problem in wireless sensor networks, distance sensitive service discovery, where nearby or closest service selection guarantee is expected. We pro...
Xu Li, Nicola Santoro, Ivan Stojmenovic
« Prev « First page 2447 / 2528 Last » Next »