Sciweavers

1092 search results - page 33 / 219
» Located Operators
Sort
View
AICT
2008
IEEE
14 years 4 months ago
Attaching an IMS Subscriber to an Unknown Foreign Network
The networking landscape is about to change. The multitude of different kind of operators and access networks can provide access at any time irrespective of location. However, it ...
Seppo Heikkinen
CC
2006
Springer
118views System Software» more  CC 2006»
14 years 1 months ago
Lightweight Lexical Closures for Legitimate Execution Stack Access
We propose a new language concept called "L-closures" for a running program to legitimately inspect/modify the contents of its execution stack. L-closures are lightweight...
Masahiro Yasugi, Tasuku Hiraishi, Taiichi Yuasa
PLDI
2005
ACM
14 years 3 months ago
Path slicing
We present a new technique, path slicing, that takes as input a possibly infeasible path to a target location, and eliminates all the operations that are irrelevant towards the re...
Ranjit Jhala, Rupak Majumdar
VLDB
1998
ACM
116views Database» more  VLDB 1998»
14 years 2 months ago
The Heterogeneity Problem and Middleware Technology: Experiences with and Performance of Database Gateways
In this paper, we present the results that we have obtained by comparing and testing three well-known database middleware solutions. We have analyzed their features related to glo...
Fernando de Ferreira Rezende, Klaudia Hergula
CVPR
2007
IEEE
14 years 12 months ago
Robust Occlusion Handling in Object Tracking
In object tracking, occlusions significantly undermine the performance of tracking algorithms. Unlike the existing methods that solely depend on the observed target appearance to ...
Jiyan Pan, Bo Hu