Sciweavers

8503 search results - page 1567 / 1701
» Secure Software Architectures
Sort
View
COORDINATION
2000
Springer
14 years 1 months ago
Scripting Coordination Styles
Abstract. The fact that so many different kinds of coordination models and languages have been proposed suggests that no one single approach will be the best for all coordination p...
Franz Achermann, Stefan Kneubuehl, Oscar Nierstras...
ICDAR
1999
IEEE
14 years 1 months ago
Preattentive Reading and Selective Attention for Document Image Analysis
PixED (from Pixel to Electronic Document) is aimed at converting document images into structured electronic documents which can be read by a machine for information retrieval. The...
Claudie Faure
IPCCC
1999
IEEE
14 years 1 months ago
Management policies for non-volatile write caches
Many computer hardware and software architectures buffer data in memory to improve system performance. Volatile disk or file caches are sometimes used to delay the propagation of ...
Theodore R. Haining, Darrell D. E. Long
CIKM
1999
Springer
14 years 1 months ago
Rule-Based Query Optimization, Revisited
We present the architecture and a performance assessment of an extensible query optimizer written in Venus. Venus is a general-purpose active-database rule language embedded in C+...
Lane Warshaw, Daniel P. Miranker
COLLABORATION
1999
Springer
14 years 1 months ago
Shifting the Focus from Control to Communication: the STReams OBjects Environments Model of Communicating Agents
The paper presents the computational model underlying new agent communication languages. The model, called STROBE, has been identified and two prototypical languages inspired by th...
Stefano A. Cerri
« Prev « First page 1567 / 1701 Last » Next »