Sciweavers

3305 search results - page 652 / 661
» Can we Rely on SQL
Sort
View
INDOCRYPT
2001
Springer
13 years 12 months ago
Mobile Agent Route Protection through Hash-Based Mechanisms
Abstract. One approach to secure mobile agent execution is restricting the agent route to trusted environments. A necessary condition for this approach to be practical is that the ...
Josep Domingo-Ferrer
MM
2000
ACM
114views Multimedia» more  MM 2000»
13 years 12 months ago
Virtual 3D camera composition from frame constraints
We have designed a graphical interface that enables 3D visual artists or developers of interactive 3D virtual environments to efficiently define sophisticated camera compositions ...
William H. Bares, Scott McDermott, Christina Boudr...
ECOOP
1998
Springer
13 years 11 months ago
Precise Visual Specification of Design Patterns
There has been substantial recent interest in captured design expertise expressed as design patterns. Prevalent descriptions of these design patterns suffer from two demerits. Firs...
Anthony Lauder, Stuart Kent
ICCBR
1997
Springer
13 years 11 months ago
Supporting Combined Human and Machine Planning: An Interface for Planning by Analogical Reasoning
Realistic and complex planning situations require a mixed-initiative planning framework in which human and automated planners interact to mutually construct a desired plan. Ideally...
Michael T. Cox, Manuela M. Veloso
SIGMOD
1993
ACM
163views Database» more  SIGMOD 1993»
13 years 11 months ago
The LRU-K Page Replacement Algorithm For Database Disk Buffering
This paper introduces a new approach to database disk buffering, called the LRU–K method. The basic idea of LRU–K is to keep track of the times of the last K references to pop...
Elizabeth J. O'Neil, Patrick E. O'Neil, Gerhard We...