Sciweavers

362 search results - page 44 / 73
» An access control model for simplifying constraint expressio...
Sort
View
VLDB
2007
ACM
147views Database» more  VLDB 2007»
14 years 7 months ago
A General Framework for Modeling and Processing Optimization Queries
An optimization query asks for one or more data objects that maximize or minimize some function over the data set. We propose a general class of queries, model-based optimization ...
Michael Gibas, Ning Zheng, Hakan Ferhatosmanoglu
ACSAC
2006
IEEE
14 years 1 months ago
A Module System for Isolating Untrusted Software Extensions
With the recent advent of dynamically extensible software systems, in which software extensions may be dynamically loaded into the address space of a core application to augment i...
Philip W. L. Fong, Simon A. Orr
ICRA
2010
IEEE
105views Robotics» more  ICRA 2010»
13 years 6 months ago
Towards passive object on-orbit manipulation by cooperating free-flying robots
——Space exploitation will require efficient techniques for manipulating passive objects on orbit. This work presents a manipulation concept that utilizes both the on-off thruste...
Georgios Rekleitis, Evangelos Papadopoulos
WSCG
2004
143views more  WSCG 2004»
13 years 9 months ago
View Dependent Stochastic Sampling for Efficient Rendering of Point Sampled Surfaces
In this paper we present a new technique for rendering very large datasets representing point-sampled surfaces. Rendering efficiency is considerably improved by using stochastic s...
Sushil Bhakar, Liang Luo, Sudhir P. Mudur
CL
2010
Springer
13 years 7 months ago
Isolating untrusted software extensions by custom scoping rules
In a modern programming language, scoping rules determine the visibility of names in various regions of a program [15]. In this work, we examine the idea of allowing an applicatio...
Philip W. L. Fong, Simon A. Orr