Sciweavers

7607 search results - page 1492 / 1522
» Querying data provenance
Sort
View
EDBT
2008
ACM
159views Database» more  EDBT 2008»
14 years 7 months ago
P2P systems with transactional semantics
Structured P2P systems have been developed for constructing applications at internet scale in cooperative environments and exhibit a number of desirable features such as scalabili...
Shyam Antony, Divyakant Agrawal, Amr El Abbadi
EDBT
2008
ACM
159views Database» more  EDBT 2008»
14 years 7 months ago
Deleting index entries from compliance storage
In response to regulatory focus on secure retention of electronic records, businesses are using magnetic disks configured as write-once read-many (WORM) compliance storage devices...
Soumyadeb Mitra, Marianne Winslett, Nikita Borisov
ICFP
2008
ACM
14 years 7 months ago
Flask: staged functional programming for sensor networks
Severely resource-constrained devices present a confounding challenge to the functional programmer: we are used to having powerful ion facilities at our fingertips, but how can we...
Geoffrey Mainland, Greg Morrisett, Matt Welsh
CVPR
2010
IEEE
14 years 3 months ago
Chaotic Invariants of Lagrangian Particle Trajectories for Anomaly Detection in Crowded Scenes
A novel method for crowd flow modeling and anomaly detection is proposed for both coherent and incoherent scenes. The novelty is revealed in three aspects. First, it is a unique ut...
Shandong Wu, Brian E. Moore, and Mubarak Shah
IPSN
2010
Springer
14 years 2 months ago
Online distributed sensor selection
A key problem in sensor networks is to decide which sensors to query when, in order to obtain the most useful information (e.g., for performing accurate prediction), subject to co...
Daniel Golovin, Matthew Faulkner, Andreas Krause
« Prev « First page 1492 / 1522 Last » Next »