Sciweavers

1017 search results - page 187 / 204
» Some existence and construction results of polygonal designs
Sort
View
WWW
2010
ACM
14 years 2 months ago
A pattern tree-based approach to learning URL normalization rules
Duplicate URLs have brought serious troubles to the whole pipeline of a search engine, from crawling, indexing, to result serving. URL normalization is to transform duplicate URLs...
Tao Lei, Rui Cai, Jiang-Ming Yang, Yan Ke, Xiaodon...
ICDCS
2007
IEEE
14 years 1 months ago
An Asymmetric Quorum-based Power Saving Protocol for Clustered Ad Hoc Networks
Clustering in Mobile Ad Hoc Networks (MANETs) has shown to be a promising technique to ensure the scalability and efficiency of various communication protocols. Since stations in...
Shan-Hung Wu, Chung-Min Chen, Ming-Syan Chen
CASES
2006
ACM
14 years 1 months ago
Supporting precise garbage collection in Java Bytecode-to-C ahead-of-time compiler for embedded systems
A Java bytecode-to-C ahead-of-time compiler (AOTC) can improve the performance of a Java virtual machine (JVM) by translating bytecode into C code, which is then compiled into mac...
Dong-Heon Jung, Sung-Hwan Bae, Jaemok Lee, Soo-Moo...
DCOSS
2005
Springer
14 years 27 days ago
jWebDust : A Java-Based Generic Application Environment for Wireless Sensor Networks
Abstract. Wireless sensor networks can be very useful in applications that require the detection of crucial events, in physical environments subjected to critical conditions, and t...
Ioannis Chatzigiannakis, Georgios Mylonas, Sotiris...
SIGMOD
2010
ACM
227views Database» more  SIGMOD 2010»
14 years 6 days ago
SecureBlox: customizable secure distributed data processing
We present SecureBlox, a declarative system that unifies a distributed query processor with a security policy framework. SecureBlox decouples security concerns from system speci...
William R. Marczak, Shan Shan Huang, Martin Braven...