Sciweavers

144 search results - page 22 / 29
» Dynamic Event-Based Access Control as Term Rewriting
Sort
View
WWW
2004
ACM
14 years 8 months ago
How to make a semantic web browser
Two important architectural choices underlie the success of the Web: numerous, independently operated servers speak a common protocol, and a single type of client--the Web browser...
D. A. Quan, R. Karger
OOPSLA
2004
Springer
14 years 25 days ago
Transparent proxies for java futures
A proxy object is a surrogate or placeholder that controls access to another target object. Proxies can be used to support distributed programming, lazy or parallel evaluation, ac...
Polyvios Pratikakis, Jaime Spacco, Michael W. Hick...
ASSETS
2006
ACM
14 years 1 months ago
VoxBoox: : a system for automatic generation of interactive talking books
The VoxBoox system makes digital books accessible to visually impaired individuals via audio and voice. It automatically translates a book published in HTML to VoiceXML, and then ...
Aanchal Jain, Gopal Gupta
RTCSA
2008
IEEE
14 years 1 months ago
Power-Aware Data Buffer Cache Management in Real-Time Embedded Databases
The demand for real-time data services in embedded systems is increasing. In these new computing platforms, using traditional buffer management schemes, whose goal is to minimize ...
Woochul Kang, Sang Hyuk Son, John A. Stankovic
MSWIM
2005
ACM
14 years 1 months ago
Adapting WLAN MAC parameters to enhance VoIP call capacity
This work describes a detailed simulation-based study of the performance of an IEEE 802.11e Medium Access Control (MAC) layer over an IEEE 802.11g Physical (PHY) layer. The study ...
Gráinne Hanley, Seán Murphy, Liam Mu...