Sciweavers

693 search results - page 91 / 139
» Categorical Properties of The Complex Numbers
Sort
View
PODS
2004
ACM
137views Database» more  PODS 2004»
14 years 8 months ago
On the Memory Requirements of XPath Evaluation over XML Streams
The important challenge of evaluating XPath queries over XML streams has sparked much interest in the past few years. A number of algorithms have been proposed, supporting wider f...
Ziv Bar-Yossef, Marcus Fontoura, Vanja Josifovski
EDBT
2008
ACM
188views Database» more  EDBT 2008»
14 years 8 months ago
FAME-DBMS: Tailor-made Data Management Solutions for Embedded Systems
Data management functionality is not only needed in large-scale server systems, but also in embedded systems. Resource restrictions and heterogeneity of hardware, however, complic...
Marko Rosenmüller, Norbert Siegmund, Horst Sc...
GLOBECOM
2009
IEEE
14 years 3 months ago
A Logic Distance-Based Method for Deploying Probing Sources in the Topology Discovery
Abstract—Internet topology plays a vital role in studying network’s internal structure and properties. Currently traceroutebased topology discovery is the main approach to map ...
Xin Zou, Zhongliang Qiao, Gang Zhou, Ke Xu
ICASSP
2009
IEEE
14 years 3 months ago
Distance blurring for space-variant image coding
We present a novel selective blurring algorithm that mimics the optical distance blur effects that occur naturally in cameras and eyes. The proposed algorithm provides a realistic...
Tim Popkin, Andrea Cavallaro, David Hands
CSFW
2008
IEEE
14 years 3 months ago
Evidence-Based Audit
Authorization logics provide a principled and flexible approach to specifying access control policies. One of their compelling benefits is that a proof in the logic is evidence ...
Jeffrey A. Vaughan, Limin Jia, Karl Mazurak, Steve...