Sciweavers

12637 search results - page 2451 / 2528
» Security for Extensible Systems
Sort
View
ARTCOM
2009
IEEE
14 years 2 months ago
Load Balancing in Multi ECU Configuration
—Electronic Control Units (ECUs) are nowadays employed in automotives for discharging various functionalities within the vehicle. It has become the fundamental building block of ...
Rajeshwari Hegde, K. S. Gurumurthy
ICDE
2009
IEEE
133views Database» more  ICDE 2009»
14 years 2 months ago
STAR: Steiner-Tree Approximation in Relationship Graphs
— Large graphs and networks are abundant in modern information systems: entity-relationship graphs over relational data or Web-extracted entities, biological networks, social onl...
Gjergji Kasneci, Maya Ramanath, Mauro Sozio, Fabia...
ICDE
2009
IEEE
120views Database» more  ICDE 2009»
14 years 2 months ago
Recommending Join Queries via Query Log Analysis
— Complex ad hoc join queries over enterprise databases are commonly used by business data analysts to understand and analyze a variety of enterprise-wide processes. However, eff...
Xiaoyan Yang, Cecilia M. Procopiuc, Divesh Srivast...
PERCOM
2009
ACM
14 years 2 months ago
On the Accuracy of RFID-based Localization in a Mobile Wireless Network Testbed
Abstract—The extensive recent research in protocols development for wireless networks must be complemented with simple yet efficient prototyping and evaluation mechanism. MiNT-2...
Vikram P. Munishwar, Shailendra Singh 0003, Xiaosh...
ICS
2009
Tsinghua U.
14 years 2 months ago
QuakeTM: parallelizing a complex sequential application using transactional memory
“Is transactional memory useful?” is the question that cannot be answered until we provide substantial applications that can evaluate its capabilities. While existing TM appli...
Vladimir Gajinov, Ferad Zyulkyarov, Osman S. Unsal...
« Prev « First page 2451 / 2528 Last » Next »