Sciweavers

2030 search results - page 357 / 406
» The Need for Customizable Operating Systems
Sort
View
ACNS
2011
Springer
241views Cryptology» more  ACNS 2011»
12 years 11 months ago
Misuse Detection in Consent-Based Networks
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
Mansoor Alicherry, Angelos D. Keromytis
SIGMOD
2011
ACM
176views Database» more  SIGMOD 2011»
12 years 10 months ago
Sharing work in keyword search over databases
An important means of allowing non-expert end-users to pose ad hoc queries — whether over single databases or data integration systems — is through keyword search. Given a set...
Marie Jacob, Zachary G. Ives
GIS
2006
ACM
14 years 8 months ago
Efficient GML-native processors for web-based GIS: techniques and tools
Geography Markup Language (GML) is an XML-based language for the markup, storage, and exchange of geospatial data. It provides a rich geospatial vocabulary and allows flexible doc...
Chia-Hsin Huang, Tyng-Ruey Chuang, Dong-Po Deng, H...
ESOP
2010
Springer
14 years 2 months ago
A Universal Calculus for Stream Processing Languages
Stream processing applications such as algorithmic trading, MPEG processing, and web content analysis are ubiquitous and essential to business and entertainment. Language designers...
Robert Soulé, Martin Hirzel, Robert Grimm, ...
CCECE
2009
IEEE
14 years 2 months ago
Inverse data transformation for change detection in wind turbine diagnostics
A complex system is expected to show different nominal behaviors under different conditions, and the deviation over time from these nominal behaviors is an indicator of potential ...
Yanjun Yan, Lisa Ann Osadciw, Glen Benson, Eric Wh...