Sciweavers

366 search results - page 24 / 74
» Access Policy Design Supported by FCA Methods
Sort
View
TSP
2008
118views more  TSP 2008»
13 years 8 months ago
Channel-Aware Random Access Control for Distributed Estimation in Sensor Networks
A cross-layered slotted ALOHA protocol is proposed and analyzed for distributed estimation in sensor networks. Suppose that the sensors in the network record local measurements of ...
Y.-W. P. Hong, Keng-U Lei, Chong-Yung Chi
POS
1998
Springer
14 years 28 days ago
Optimizing the Read and Write Barriers for Orthogonal Persistence
Persistent programming languages manage volatile memory as a cache for stable storage, imposing a read barrier on operations that access the cache, and a write barrier on updates ...
Antony L. Hosking, Nathaniel Nystrom, Quintin I. C...
EUROPAR
2001
Springer
14 years 1 months ago
Building Computational Communities from Federated Resources
We describe the design and the implementation in Java and Jini of a Computational Community, which supports the federation of resources from different organisations. Resources fro...
Nathalie Furmento, Steven Newhouse, John Darlingto...
AGTIVE
2007
Springer
13 years 10 months ago
Adaptable Support for Queries and Transformations for the DRAGOS Graph-Database
Abstract. The DRAGOS database eases the development of graphbased applications by providing a uniform graph-oriented data storage facility. In this paper, we extend the existing da...
Erhard Weinell
ICMI
2004
Springer
95views Biometrics» more  ICMI 2004»
14 years 2 months ago
EyePrint: support of document browsing with eye gaze trace
Current digital documents provide few traces to help user browsing. This makes document browsing difficult, and we sometimes feel it is hard to keep track of all of the informati...
Takehiko Ohno