Sciweavers

4344 search results - page 662 / 869
» The resourcefulness of everyday design
Sort
View
CRYPTO
2005
Springer
149views Cryptology» more  CRYPTO 2005»
14 years 3 months ago
Authenticating Pervasive Devices with Human Protocols
Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive computing devices. These devices lack the computational, storage, power, and communication r...
Ari Juels, Stephen A. Weis
DEXA
2005
Springer
176views Database» more  DEXA 2005»
14 years 3 months ago
Control-Based Quality Adaptation in Data Stream Management Systems
Unlike processing snapshot queries in a traditional DBMS, the processing of continuous queries in a data stream management system (DSMS) needs to satisfy quality requirements such ...
Yi-Cheng Tu, Mohamed Hefeeda, Yuni Xia, Sunil Prab...
DMG
2005
Springer
14 years 3 months ago
An Adaptive Distributed Query Processing Grid Service
Grid services provide an important abstract layer on top of heterogeneous components (hardware and software) that take part into a grid environment. We are developing a data grid s...
Fabio Porto, Vinícius F. V. da Silva, M&aac...
DSOM
2005
Springer
14 years 3 months ago
Control Considerations for Scalable Event Processing
The growth in the scale of systems and networks has created many challenges for their management, especially for event processing. Our premise is that scaling event processing requ...
Wei Xu, Joseph L. Hellerstein, Bill Kramer, David ...
EUC
2005
Springer
14 years 3 months ago
On Tools for Modeling High-Performance Embedded Systems
Abstract. Most of the new embedded systems require high performance processors at low power. To cater to these needs, most semiconductor companies are designing multi-core processo...
Anilkumar Nambiar, Vipin Chaudhary