Sciweavers

4340 search results - page 807 / 868
» Designing for change
Sort
View
139
Voted
GRID
2005
Springer
15 years 9 months ago
A credential renewal service for long-running jobs
— Jobs on the Grid require security credentials throughout their run for accessing secure Grid resources, such as GridFTP data repositories. However, delegating long-lived creden...
Daniel Kouril, Jim Basney
106
Voted
ICISS
2005
Springer
15 years 9 months ago
Event Detection in Multilevel Secure Active Databases
The event-condition-action paradigm (also known as triggers or rules) is a powerful technology. It gives a database “active” capabilities – the ability to react automatically...
Indrakshi Ray, Wei Huang
138
Voted
ICMI
2005
Springer
267views Biometrics» more  ICMI 2005»
15 years 9 months ago
XfaceEd: authoring tool for embodied conversational agents
In this paper, XfaceEd, our open source, platform independent tool for authoring 3D embodied conversational agents (ECAs) is presented. Following MPEG-4 Facial Animation (FA) stan...
Koray Balci
113
Voted
LOCA
2005
Springer
15 years 9 months ago
The GETA Sandals: A Footprint Location Tracking System
This paper presents the design, implementation, and evaluation of a footprintbased indoor location system on traditional Japanese GETA sandals. Our footprint location system can s...
Kenji Okuda, Shun-yuan Yeh, Chon-in Wu, Keng-hao C...
148
Voted
VLDB
2005
ACM
140views Database» more  VLDB 2005»
15 years 9 months ago
Loadstar: Load Shedding in Data Stream Mining
In this demo, we show that intelligent load shedding is essential in achieving optimum results in mining data streams under various resource constraints. The Loadstar system intro...
Yun Chi, Haixun Wang, Philip S. Yu