Sciweavers

1548 search results - page 281 / 310
» Computational Approaches to Sentence Completion
Sort
View
CCS
2007
ACM
14 years 2 months ago
A simple and expressive semantic framework for policy composition in access control
In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
Glenn Bruns, Daniel S. Dantas, Michael Huth
HAPTICS
2006
IEEE
14 years 2 months ago
Haptic Manipulation of Microspheres Using Optical Tweezers
Using optical tweezers (OT) and a haptic device, microspheres having diameters ranging from 3 to 4 ␮m (floating in a fluid solution) are manipulated in order to form patterns ...
Ibrahim Bukusoglu, Cagatay Basdogan, Alper Kiraz, ...
CF
2006
ACM
14 years 2 months ago
Kilo-instruction processors, runahead and prefetching
There is a continuous research effort devoted to overcome the memory wall problem. Prefetching is one of the most frequently used techniques. A prefetch mechanism anticipates the ...
Tanausú Ramírez, Alex Pajuelo, Olive...
SENSYS
2006
ACM
14 years 2 months ago
Funneling-MAC: a localized, sink-oriented MAC for boosting fidelity in sensor networks
Sensor networks exhibit a unique funneling effect which is a product of the distinctive many-to-one, hop-by-hop traffic pattern found in sensor networks, and results in a signific...
Gahng-Seop Ahn, Se Gi Hong, Emiliano Miluzzo, Andr...
JCDL
2005
ACM
100views Education» more  JCDL 2005»
14 years 2 months ago
What's there and what's not?: focused crawling for missing documents in digital libraries
Some large scale topical digital libraries, such as CiteSeer, harvest online academic documents by crawling open-access archives, university and author homepages, and authors’ s...
Ziming Zhuang, Rohit Wagle, C. Lee Giles