Sciweavers

2715 search results - page 406 / 543
» An Implementation of Narrowing Strategies
Sort
View
VLDB
2005
ACM
112views Database» more  VLDB 2005»
14 years 3 months ago
Content-Based Routing: Different Plans for Different Data
Query optimizers in current database systems are designed to pick a single efficient plan for a given query based on current statistical properties of the data. However, different...
Pedro Bizarro, Shivnath Babu, David J. DeWitt, Jen...
W2GIS
2005
Springer
14 years 3 months ago
A Framework for Dynamic Updates of Map Data in Mobile Devices
: Stored map services in mobile devices, such as cellular phones, are being commercialised for the mobile and wireless environment. In order to ensure the quality and accuracy of t...
Hae-Kyong Kang, Ki-Joune Li
WEA
2005
Springer
109views Algorithms» more  WEA 2005»
14 years 3 months ago
Synchronization Fault Cryptanalysis for Breaking A5/1
Abstract. A5/1 pseudo-random bit generator, known from GSM networks, potentially might be used for different purposes, such as secret hiding during cryptographic hardware testing, ...
Marcin Gomulkiewicz, Miroslaw Kutylowski, Heinrich...
ACMACE
2004
ACM
14 years 3 months ago
Extending game participation with embodied reporting agents
We introduce a multi-agent framework to generate reports of players' activities within multi-player computer games so that other players who are currently unable to participa...
Dan Fielding, Mike Fraser, Brian Logan, Steve Benf...
CSCW
2004
ACM
14 years 3 months ago
Lilsys: Sensing Unavailability
As communications systems increasingly gather and propagate information about people’s reachability or “presence”, users need better tools to minimize undesired interruption...
James Begole, Nicholas E. Matsakis, John C. Tang