Sciweavers

2272 search results - page 189 / 455
» Validity Invariants and Effects
Sort
View
CAMAD
2006
IEEE
14 years 2 months ago
On the exploitation of user aggregation strategies in heterogeneous wireless networks
Abstract-- In this paper we discuss the exploitation of aggregated mobility patterns and physical proximity of nodes in a so-called ambient network, i.e., a wireless network with h...
Leonardo Badia, Nicola Bui, Marco Miozzo, Michele ...
CCS
2006
ACM
14 years 2 months ago
Lightweight, pollution-attack resistant multicast authentication scheme
Authentication is an important security measure for multicast applications, providing receivers with confidence that the packets they receive are valid. Simply signing every multi...
Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin
VLDB
1987
ACM
66views Database» more  VLDB 1987»
14 years 1 months ago
A New Compression Method with Fast Searching on Large Databases
In this paper, a new compression method for constant removal from very large scientific and statistical databases is presented. The new method combines the best features from seve...
Jianzhong Li, Doron Rotem, Harry K. T. Wong
CBSE
2008
Springer
14 years 11 days ago
A Practical Approach for Finding Stale References in a Dynamic Service Platform
The OSGiTM Service Platform is becoming the de facto standard for modularized Java applications. The market of OSGi based COTS components is continuously growing. OSGi specific pro...
Kiev Gama, Didier Donsez
AIM
2006
13 years 11 months ago
Developing a framework for analyzing IS/IT backsourcing
: Companies implementing an IS/IT backsourcing strategy (i.e. bringing IT functions back in-house after they have been outsourced) aiming at increasing operational effectiveness ma...
Jacky Akoka, Isabelle Comyn-Wattiau