Sciweavers

2663 search results - page 469 / 533
» How to Choose a Timing Model
Sort
View
ACSW
2003
13 years 10 months ago
A Secure Pervasive Environment
This paper explores the complications encountered when attempting to create a secure pervasive computing environment. The model introduced in this paper is primarily conceptual. T...
Patrick G. McLean
DAIS
2003
13 years 10 months ago
Middleware Support for Resource-Constrained Software Deployment
Abstract The JAMUS platform is dedicated to providing a safe runtime environment for untrusted Java application programs, while offering each of these programs access to the resour...
Nicolas Le Sommer, Frédéric Guidec
NIPS
2004
13 years 10 months ago
Dynamic Bayesian Networks for Brain-Computer Interfaces
We describe an approach to building brain-computer interfaces (BCI) based on graphical models for probabilistic inference and learning. We show how a dynamic Bayesian network (DBN...
Pradeep Shenoy, Rajesh P. N. Rao
WSCG
2003
123views more  WSCG 2003»
13 years 10 months ago
From Dupin Cyclides to Scaled Cyclides
Dupin cyclides are algebraic surfaces introduced for the first time in 1822 by the French mathematician Pierre-Charles Dupin. They have a low algebraic degree and have been propo...
Lionel Garnier, Sebti Foufou, Marc Neveu
WDAS
1998
13 years 10 months ago
Data Replication and Delay Balancing in Heterogeneous Disk Systems
Declustering and replication are well known techniques used to improve response time of queries in parallel disk environments. As data replication incurs a penalty for updates, da...
Doron Rotem, Sridhar Seshadri, Luis M. Bernardo