Sciweavers

4870 search results - page 818 / 974
» Construction of Wavelets and Applications
Sort
View
SOCIALCOM
2010
15 years 2 months ago
Secure Wireless Embedded Systems Via Component-based Design
This paper introduces the method secure-by-design as a way of constructing wireless embedded systems using component-based modeling frameworks. This facilitates design of secure a...
Theis Hjorth, Rune Torbensen
116
Voted
UIST
2010
ACM
15 years 2 months ago
Chronicle: capture, exploration, and playback of document workflow histories
We describe Chronicle, a new system that allows users to explore document workflow histories. Chronicle captures the entire video history of a graphical document, and provides lin...
Tovi Grossman, Justin Matejka, George W. Fitzmauri...
CP
2009
Springer
15 years 2 months ago
Lazy Clause Generation Reengineered
Abstract. Lazy clause generation is a powerful hybrid approach to combinatorial optimization that combines features from SAT solving and finite domain (FD) propagation. In lazy cla...
Thibaut Feydy, Peter J. Stuckey
206
Voted
DLS
2009
179views Languages» more  DLS 2009»
15 years 2 months ago
Directing JavaScript with arrows
JavaScript programmers make extensive use of event-driven programming to help build responsive web applications. However, standard approaches to sequencing events are messy, and o...
Yit Phang Khoo, Michael Hicks, Jeffrey S. Foster, ...
EDBT
2009
ACM
149views Database» more  EDBT 2009»
15 years 2 months ago
Towards integrated and efficient scientific sensor data processing: a database approach
In this work, we focus on managing scientific environmental data, which are measurement readings collected from wireless sensors. In environmental science applications, raw sensor...
Ji Wu, Yongluan Zhou, Karl Aberer, Kian-Lee Tan