Sciweavers

15251 search results - page 2952 / 3051
» Network Science - Theory and Application
Sort
View
CAISE
2003
Springer
14 years 2 months ago
PIX-Grid: A Platform for P2P Photo Exchange
The proliferation of digital camera devices (stand-alone or combined with cell phones), new protocols such as MMS and the desire of people to communicate and share their experience...
Karl Aberer, Philippe Cudré-Mauroux, Anwita...
ICARIS
2003
Springer
14 years 2 months ago
An Investigation of the Negative Selection Algorithm for Fault Detection in Refrigeration Systems
Supermarkets lose millions of pounds every year through lost trading and stock wastage caused by the failure of refrigerated cabinets. Therefore, a huge commercial market exists fo...
Dan W. Taylor, David Corne
AGP
2010
IEEE
14 years 2 months ago
Constraint Logic Programming
Constraint Logic Programming (CLP) is one of the most successful branches of Logic Programming; it attracts the interest of theoreticians and practitioners, and it is currently use...
Marco Gavanelli, Francesca Rossi
CLOUD
2010
ACM
14 years 2 months ago
Stateful bulk processing for incremental analytics
This work addresses the need for stateful dataflow programs that can rapidly sift through huge, evolving data sets. These data-intensive applications perform complex multi-step c...
Dionysios Logothetis, Christopher Olston, Benjamin...
SACMAT
2010
ACM
14 years 1 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
« Prev « First page 2952 / 3051 Last » Next »