Sciweavers

3712 search results - page 594 / 743
» Role-Based Access Control
Sort
View
ICRA
2002
IEEE
105views Robotics» more  ICRA 2002»
14 years 3 months ago
A Robotic Library System for an Off-Site Shelving Facility
This paper describes a unique robotics project, Comprehensive Access to Printed Materials (CAPM), within the context of libraries. As libraries provide a growing array of digital ...
Jackrit Suthakorn, Sangyoon Lee, Yu Zhou, Rory Tho...
ITCC
2002
IEEE
14 years 3 months ago
Performance of KDB-Trees with Query-Based Splitting
While the persistent data of many advanced database applications, such as OLAP and scientific studies, are characterized by very high dimensionality, typical queries posed on thes...
Yves Lépouchard, John L. Pfaltz, Ratko Orla...
MICRO
2002
IEEE
128views Hardware» more  MICRO 2002»
14 years 3 months ago
Compiler-directed instruction cache leakage optimization
Excessive power consumption is widely considered as a major impediment to designing future microprocessors. With the continued scaling down of threshold voltages, the power consum...
Wei Zhang 0002, Jie S. Hu, Vijay Degalahal, Mahmut...
GECCO
2010
Springer
196views Optimization» more  GECCO 2010»
14 years 3 months ago
Using synthetic test suites to empirically compare search-based and greedy prioritizers
The increase in the complexity of modern software has led to the commensurate growth in the size and execution time of the test suites for these programs. In order to address this...
Zachary D. Williams, Gregory M. Kapfhammer
SAC
2009
ACM
14 years 2 months ago
Towards developing a trust-based security solution
Wireless sensor network has emerged as a new information and data gathering paradigm based on the collaborative efforts of a large number of autonomous sensing devices. With small...
Sheikh Iqbal Ahamed, Donghyun Kim, Chowdhury Shari...