Sciweavers

439 search results - page 37 / 88
» Communication Via Decentralized Processing
Sort
View
144
Voted
SACMAT
2010
ACM
15 years 7 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
144
Voted
AMAST
2000
Springer
15 years 7 months ago
The Algebra of Multi-tasking
Modelling multi-tasking behaviour is an important phase of real-time system design. It is shown how task scheduling principles can be captured in a CCS-based process algebra via ex...
Colin J. Fidge
137
Voted
CORR
2010
Springer
249views Education» more  CORR 2010»
15 years 2 months ago
Lower Bounds on Near Neighbor Search via Metric Expansion
In this paper we show how the complexity of performing nearest neighbor (NNS) search on a metric space is related to the expansion of the metric space. Given a metric space we loo...
Rina Panigrahy, Kunal Talwar, Udi Wieder
VLDB
2008
ACM
147views Database» more  VLDB 2008»
16 years 2 months ago
PicShark: mitigating metadata scarcity through large-scale P2P collaboration
With the commoditization of digital devices, personal information and media sharing is becoming a key application on the pervasive Web. In such a context, data annotation rather th...
Philippe Cudré-Mauroux, Adriana Budura, Manfred H...
125
Voted
AVSS
2006
IEEE
15 years 8 months ago
Optimal Power Scheduling for Data Fusion in Inhomogeneous Wireless Sensor Networks
We consider the problem of optimal power scheduling for the decentralized detection of a deterministic signal in an inhomogeneous wireless sensor network. The observation noise at...
Thakshila Wimalajeewa, Sudharman K. Jayaweera