Sciweavers

1855 search results - page 296 / 371
» System Consequence
Sort
View
IJSN
2008
145views more  IJSN 2008»
13 years 10 months ago
Clique-based group key assignment in Wireless Sensor Networks
: Security has become the corner stone of research in wireless sensor networks (WSNs). Due to the unique operational environment of WSNs, where the communication medium is open to ...
Avinash Srinivasan, Feng Li, Jie Wu, Minglu Li
CSCW
2004
ACM
13 years 9 months ago
Small-Scale Classification Schemes: A Field Study of Requirements Engineering
Small-scale classification schemes are used extensively in the coordination of cooperative work. This study investigates the creation and use of a classification scheme for handlin...
Morten Hertzum
SIGMETRICS
1999
ACM
120views Hardware» more  SIGMETRICS 1999»
14 years 2 months ago
A Performance Study of Dynamic Replication Techniques in Continuous Media Servers
Multimedia applications are emerging in education, information dissemination, entertainment, as well as many other applications. The stringent requirements of such applications ma...
Cheng-Fu Chou, Leana Golubchik, John C. S. Lui
PLDI
2004
ACM
14 years 3 months ago
Fast searches for effective optimization phase sequences
It has long been known that a fixed ordering of optimization phases will not produce the best code for every application. One approach for addressing this phase ordering problem ...
Prasad Kulkarni, Stephen Hines, Jason Hiser, David...
CCGRID
2006
IEEE
14 years 4 months ago
Component-Based Modeling, Analysis and Animation
Component-based software construction is widely used in a variety of applications, from embedded environments to grid computing. However, errors in these applications and systems ...
Jeff Kramer