Sciweavers

270 search results - page 17 / 54
» Idea: Efficient Evaluation of Access Control Constraints
Sort
View
ICDCS
2007
IEEE
13 years 11 months ago
Efficient Execution of Continuous Incoherency Bounded Queries over Multi-Source Streaming Data
On-line decision making often involves query processing over time-varying data which arrives in the form of data streams from distributed locations. In such environments typically...
Manish Bhide, Krithi Ramamritham, Mukund Agrawal
WSCG
2000
131views more  WSCG 2000»
13 years 8 months ago
Dynamic Animation of N-Dimensional Deformable Objects
This paper presents a new, accurate, efficient and unified method for dynamic animation of one, two or three-dimensional deformable objects. The objects are modelled as d-dimensio...
Yannick Rémion, Jean-Michel Nourrit, Olivie...
ERCIMDL
2000
Springer
118views Education» more  ERCIMDL 2000»
13 years 11 months ago
Evaluating a User-Model Based Personalisation Architecture for Digital News Services
Abstract. An architecture that provides personalised filtering and dissemination of news items is presented. It is based on user profiles and it provides mechanisms that allow the ...
Alberto Díaz Esteban, Pablo Gervás G...
IPSN
2010
Springer
13 years 9 months ago
Adaptive IEEE 802.15.4 protocol for energy efficient, reliable and timely communications
The IEEE 802.15.4 standard for wireless sensor networks can support energy efficient, reliable, and timely packet transmission by tuning the medium access control parameters macMi...
Pan Gun Park, Carlo Fischione, Karl Henrik Johanss...
SIGSOFT
2003
ACM
14 years 8 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler