Sciweavers

5206 search results - page 1001 / 1042
» The Architecture Of An Active Data Base Management System
Sort
View
MOBISYS
2008
ACM
14 years 7 months ago
Improving wireless privacy with an identifier-free link layer protocol
We present the design and evaluation of an 802.11-like wireless link layer protocol that obfuscates all transmitted bits to increase privacy. This includes explicit identifiers su...
Ben Greenstein, Damon McCoy, Jeffrey Pang, Tadayos...
CIKM
1999
Springer
13 years 12 months ago
Performance and Implications of Semantic Indexing in a Distributed Environment
A research prototype is presented for semantic indexing and retrieval in Information Retrieval. The prototype is motivated by a desire to provide a more efficient and effective in...
Conrad T. K. Chang, Bruce R. Schatz
HPCA
2006
IEEE
14 years 8 months ago
LogTM: log-based transactional memory
Transactional memory (TM) simplifies parallel programming by guaranteeing that transactions appear to execute atomically and in isolation. Implementing these properties includes p...
Kevin E. Moore, Jayaram Bobba, Michelle J. Moravan...
MOBICOM
2005
ACM
14 years 1 months ago
Self-management in chaotic wireless deployments
Over the past few years, wireless networking technologies have made vast forays into our daily lives. Today, one can find 802.11 hardware and other personal wireless technology e...
Aditya Akella, Glenn Judd, Srinivasan Seshan, Pete...
JODS
2006
166views Data Mining» more  JODS 2006»
13 years 7 months ago
Model-Driven Ontology Engineering
W3C's Semantic Web provides a common framework that allows data to be shared and reused across application and enterprise. As the Semantic Web shapes the future of the Web, it...
Yue Pan, Guo Tong Xie, Li Ma, Yang Yang, Zhaoming ...
« Prev « First page 1001 / 1042 Last » Next »