Sciweavers

234 search results - page 11 / 47
» Algorithmic Power from Declarative Use of Redundant Constrai...
Sort
View
CCS
2007
ACM
14 years 1 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder
ASPDAC
2008
ACM
122views Hardware» more  ASPDAC 2008»
13 years 9 months ago
Total power optimization combining placement, sizing and multi-Vt through slack distribution management
Power dissipation is quickly becoming one of the most important limiters in nanometer IC design for leakage increases exponentially as the technology scaling down. However, power ...
Tao Luo, David Newmark, David Z. Pan
SIGMOD
2006
ACM
126views Database» more  SIGMOD 2006»
14 years 7 months ago
Constraint chaining: on energy-efficient continuous monitoring in sensor networks
Wireless sensor networks have created new opportunities for data collection in a variety of scenarios, such as environmental and industrial, where we expect data to be temporally ...
Adam Silberstein, Jun Yang 0001, Rebecca Braynard
IROS
2008
IEEE
91views Robotics» more  IROS 2008»
14 years 1 months ago
Replanning: A powerful planning strategy for hard kinodynamic problems
— A series of kinodynamic sampling-based planners have appeared over the last decade to deal with high dimensional problems for robots with realistic motion constraints. Yet, ofï...
Konstantinos I. Tsianos, Lydia E. Kavraki
HICSS
2000
IEEE
208views Biometrics» more  HICSS 2000»
13 years 12 months ago
Transfer Capability Computations in Deregulated Power Systems
With the recent trend towards deregulating power systems around the world, transfer capability computation emerges as the key issue to a smoothly running power market with multipl...
Mohamed Shaaban, Yixin Ni, Felix F. Wu