Sciweavers

161 search results - page 31 / 33
» Secure Databases: An Analysis of Clark-Wilson Model in a Dat...
Sort
View
OOPSLA
2004
Springer
14 years 21 days ago
Finding and preventing run-time error handling mistakes
It is difficult to write programs that behave correctly in the presence of run-time errors. Existing programming language features often provide poor support for executing clean-u...
Westley Weimer, George C. Necula
GIS
2010
ACM
13 years 5 months ago
Decentralized querying of topological relations between regions without using localization
This paper proposes an efficient, decentralized algorithm for determining the topological relationship between two regions monitored by a geosensor network. Many centralized algo...
Matt Duckham, Myeong Hun Jeong, Sanjiang Li, Joche...
ICIAP
2007
ACM
14 years 7 months ago
Window Detection in Facades
This work is about a novel methodology for window detection in urban environments and its multiple use in vision system applications. The presented method for window detection inc...
Haider Ali, Christin Seifert, Nitin Jindal, Lucas ...
ESA
1998
Springer
162views Algorithms» more  ESA 1998»
13 years 11 months ago
External Memory Algorithms
Abstract. Data sets in large applications are often too massive to t completely inside the computer's internal memory. The resulting input output communication or I O between ...
Jeffrey Scott Vitter
ESCIENCE
2007
IEEE
13 years 11 months ago
CDF Monte Carlo Production on LCG Grid via LcgCAF Portal
The improvements of the luminosity of the Tevatron Collider require large increases in computing requirements for the CDF experiment which has to be able to increase proportionally...
Gabriele Compostella, Donatella Lucchesi, Simone P...