Sciweavers

175 search results - page 35 / 35
» One Update for all Moving Objects at a Timestamp
Sort
View
138
Voted
CSREASAM
2006
15 years 5 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
145
Voted
ICFP
2008
ACM
16 years 3 months ago
Transactional events for ML
Transactional events (TE) are an approach to concurrent programming that enriches the first-class synchronous message-passing of Concurrent ML (CML) with a combinator that allows ...
Laura Effinger-Dean, Matthew Kehrt, Dan Grossman
115
Voted
EDBT
2008
ACM
118views Database» more  EDBT 2008»
16 years 3 months ago
Robustness in automatic physical database design
Automatic physical database design tools rely on "what-if" interfaces to the query optimizer to estimate the execution time of the training query workload under differen...
Kareem El Gebaly, Ashraf Aboulnaga
172
Voted
HICSS
2003
IEEE
193views Biometrics» more  HICSS 2003»
15 years 9 months ago
Ambient computing applications: an experience with the SPREAD approach
Todays, we assist to the explosive development of mobile computing devices like PDAs and cell-phones, the integration of embedded intelligence (like Web server) in more and more c...
Paul Couderc, Michel Banâtre
156
Voted
JETAI
2000
302views more  JETAI 2000»
15 years 3 months ago
Consciousness, intentionality and intelligence: some foundational issues for artificial intelligence
: We present three fundamental questions concerning minds. These are about consciousness, intentionality and intelligence. After we present the fundamental framework that has shape...
Murat Aydede, Guven Guzeldere