Sciweavers

762 search results - page 108 / 153
» Conditionally correct superoptimization
Sort
View
IFIP
2005
Springer
14 years 3 months ago
Type-Based Distributed Access Control vs. Untyped Attackers
This paper considers the effect of untyped attackers inside a distributed system where security is enforced by the type system. In previous work we introduced the Key-Based Decentr...
Tom Chothia, Dominic Duggan
IWQOS
2005
Springer
14 years 3 months ago
Analyzing Object Detection Quality Under Probabilistic Coverage in Sensor Networks
Abstract. Object detection quality and network lifetime are two conflicting aspects of a sensor network, but both are critical to many sensor applications such as military surveil...
Shansi Ren, Qun Li, Haining Wang, Xin Chen, Xiaodo...
COMPGEOM
2004
ACM
14 years 3 months ago
A computational framework for incremental motion
We propose a generic computational framework for maintaining a discrete geometric structure defined by a collection of static and mobile objects. We assume that the mobile object...
David M. Mount, Nathan S. Netanyahu, Christine D. ...
VRCAI
2004
ACM
14 years 3 months ago
Determining text readability over textured backgrounds in augmented reality systems
This paper concerns the application of pattern classification techniques to the domain of augmented reality. In many augmented reality applications, one of the ways in which info...
Alex Leykin, Mihran Tuceryan
ADBIS
2004
Springer
124views Database» more  ADBIS 2004»
14 years 3 months ago
Database Caching - Towards a Cost Model for Populating Cache Groups
Web caching keeps single Web objects ready somewhere in caches in the user-to-server path, whereas database caching uses fullfledged database management systems as caches to adapt...
Theo Härder, Andreas Bühmann