Sciweavers

24188 search results - page 4737 / 4838
» Computing on Encrypted Data
Sort
View
SIGUCCS
2003
ACM
15 years 9 months ago
Achieving rapid service deployment in an academic environment
Rapid product or service deployment is most commonly thought of in the corporate, rather than academic, environment. Utilizing a rapid deployment process and a number of highly de...
Shea Nangle
VRST
2003
ACM
15 years 9 months ago
Tele-sports and tele-dance: full-body network interaction
Researchers have had great success using motion capture tools for controlling avatars in virtual worlds. Another current of virtual reality research has focused on building collab...
Benjamin Schaeffer, Mark Flider, Hank Kaczmarski, ...
WIDM
2003
ACM
15 years 9 months ago
Query rewriting using views in the presence of inclusion dependencies
Query rewriting using views is an essential issue in data integration. A number of algorithms, e.g., the bucket algorithm, the inverse rules algorithm, the SVB algorithm and the M...
Qingyuan Bai, Jun Hong, Michael F. McTear
AGTIVE
2003
Springer
15 years 9 months ago
Specifying Pointer Structures by Graph Reduction
Graph-reduction specifications (GRSs) are a powerful new method for specifying classes of pointer data structures (shapes). They cover important shapes, like various forms of bal...
Adam Bakewell, Detlef Plump, Colin Runciman
ASM
2003
ASM
15 years 9 months ago
A Framework for Proving Contract-Equipped Classes
r in: Abstract State Machines 2003 — Advances in Theory and Applications, Proc. 10th International Workshop, Taormina, Italy, March 3-7, 2003, eds. Egon Boerger, Angelo Gargantin...
Bertrand Meyer
« Prev « First page 4737 / 4838 Last » Next »