Sciweavers

669 search results - page 5 / 134
» Mastering the Master Theorem
Sort
View
PERCOM
2006
ACM
14 years 7 months ago
The Master Key: A Private Authentication Approach for Pervasive Computing Environments
We propose a novel entity authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital forms of ac...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
AUIC
2003
IEEE
14 years 19 days ago
Keg Master: a Graph-Aware Visual Editor for 3D Graphs
This paper presents Keg Master, a graph-aware visual editor for 3D graphs. Keg Master is novel in that it works with a graph description language as opposed to a scene graph descr...
Hannah Slay, Matthew Phillips, Bruce H. Thomas, Ru...
CEC
2008
IEEE
14 years 1 months ago
Parallel multi-objective optimization using Master-Slave model on heterogeneous resources
Abstract— In this paper, we study parallelization of multiobjective optimization algorithms on a set of hetergeneous resources based on the Master-Slave model. Master-Slave model...
Sanaz Mostaghim, Jürgen Branke, Andrew Lewis,...
ASIAN
2007
Springer
118views Algorithms» more  ASIAN 2007»
14 years 1 months ago
Digital Rights Management Using a Master Control Device
This paper focuses on the problem of preventing the illegal copying of digital content whilst allowing content mobility within a single user domain. This paper proposes a novel sol...
Imad M. Abbadi
PVLDB
2010
99views more  PVLDB 2010»
13 years 5 months ago
Towards Certain Fixes with Editing Rules and Master Data
A variety of integrity constraints have been studied for data cleaning. While these constraints can detect the presence of errors, they fall short of guiding us to correct the err...
Wenfei Fan, Jianzhong Li, Shuai Ma, Nan Tang, Weny...