Sciweavers

2061 search results - page 349 / 413
» Authorization for Metacomputing Applications
Sort
View
127
Voted
EDBT
2008
ACM
161views Database» more  EDBT 2008»
16 years 3 months ago
Load distribution of analytical query workloads for database cluster architectures
Enterprises may have multiple database systems spread across the organization for redundancy or for serving different applications. In such systems, query workloads can be distrib...
Thomas Phan, Wen-Syan Li
125
Voted
ICIAP
2001
Springer
16 years 3 months ago
Bayesian Face Recognition with Deformable Image Models
We propose a novel representation for characterizing image differences using a deformable technique for obtaining pixel-wise correspondences. This representation, which is based o...
Baback Moghaddam, Chahab Nastar, Alex Pentland
115
Voted
ICSE
2005
IEEE-ACM
16 years 3 months ago
Real-time specification patterns
Embedded systems are pervasive and frequently used for critical systems with time-dependent functionality. Dwyer et al. have developed qualitative specification patterns to facili...
Sascha Konrad, Betty H. C. Cheng
141
Voted
ICFP
2006
ACM
16 years 3 months ago
Algebraic fusion of functions with an accumulating parameter and its improvement
We present a unifying solution to the problem of fusion of functions, where both the producer function and the consumer function have one accumulating parameter. The key idea in t...
Shin-ya Katsumata, Susumu Nishimura
160
Voted
PERCOM
2007
ACM
16 years 3 months ago
Securing distributed data storage and retrieval in sensor networks
Sensor networks have been an attractive platform for pervasive computing and communication. Due to the lack of physical protection, however, sensor networks are vulnerable to atta...
Nalin Subramanian, Chanjun Yang, Wensheng Zhang