Sciweavers

477 search results - page 90 / 96
» A Pervasive Computing System for the Operating Room of the F...
Sort
View
MOBIHOC
2000
ACM
13 years 12 months ago
Low power rendezvous in embedded wireless networks
ln the future, wireless networking will be embedded into a wide variety of common, everyday objects [1]. In many embedded networking situations, the communicating nodes will be ver...
Terry Todd, Frazer Bennett, Alan Jones
ACMACE
2007
ACM
13 years 11 months ago
Pinocchio: conducting a virtual symphony orchestra
We present a system that allows users of any skill to conduct a virtual orchestra. Tempo and volume of the orchestra's performance are influenced with a baton. Pinocchio work...
Bernd Bruegge, Christoph Teschner, Peter Lachenmai...
SIGMOD
2005
ACM
133views Database» more  SIGMOD 2005»
14 years 7 months ago
Semantics and Evaluation Techniques for Window Aggregates in Data Streams
A windowed query operator breaks a data stream into possibly overlapping subsets of data and computes results over each. Many stream systems can evaluate window aggregate queries....
Jin Li, David Maier, Kristin Tufte, Vassilis Papad...
EDBT
2009
ACM
136views Database» more  EDBT 2009»
14 years 2 months ago
Rule-based multi-query optimization
Data stream management systems usually have to process many long-running queries that are active at the same time. Multiple queries can be evaluated more efficiently together tha...
Mingsheng Hong, Mirek Riedewald, Christoph Koch, J...
CCS
2006
ACM
13 years 11 months ago
Safety analysis of usage control authorization models
The usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibi...
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Pre...