Sciweavers

29143 search results - page 5781 / 5829
» A Sortation System Model
Sort
View
EDBT
2009
ACM
145views Database» more  EDBT 2009»
14 years 2 months ago
An efficient online auditing approach to limit private data disclosure
In a database system, disclosure of confidential private data may occur if users can put together the answers of past queries. Traditional access control mechanisms cannot guard a...
Haibing Lu, Yingjiu Li, Vijayalakshmi Atluri, Jaid...
EMSOFT
2009
Springer
14 years 2 months ago
Modular static scheduling of synchronous data-flow networks: an efficient symbolic representation
This paper addresses the question of producing modular sequential imperative code from synchronous data-flow networks. Precisely, given a system with several input and output flow...
Marc Pouzet, Pascal Raymond
GLOBECOM
2009
IEEE
14 years 2 months ago
Competitive Wireless Access for Data Streaming over Vehicle-to-Roadside Communications
This paper considers the problem of optimal and competitive wireless access for data streaming over vehicleto-roadside (V2R) communication. In a service area, the onboard units (OB...
Dusit Niyato, Ekram Hossain, Ping Wang
CCGRID
2004
IEEE
14 years 2 months ago
Supporting quality of service in a non-dedicated opportunistic environment
In this paper we investigate the utilization of nondedicated, opportunistic resources in a desktop environment to provide statistical assurances to a class of QoS sensitive, soft ...
Jin Liang, Klara Nahrstedt
ATAL
2006
Springer
14 years 2 months ago
Examining DCSP coordination tradeoffs
Distributed Constraint Satisfaction Problems (DCSPs) provide a model to capture a broad range of cooperative multiagent problem solving settings. Researchers have generally propos...
Michael Benisch, Norman M. Sadeh
« Prev « First page 5781 / 5829 Last » Next »