Sciweavers

1795 search results - page 241 / 359
» Security Models and Information Flow
Sort
View
WWW
2008
ACM
14 years 11 months ago
Low-load server crawler: design and evaluation
This paper proposes a method of crawling Web servers connected to the Internet without imposing a high processing load. We are using the crawler for a field survey of the digital ...
Katsuko T. Nakahira, Tetsuya Hoshino, Yoshiki Mika...
UIST
2006
ACM
14 years 4 months ago
Huddle: automatically generating interfaces for systems of multiple connected appliances
Systems of connected appliances, such as home theaters and presentation rooms, are becoming commonplace in our homes and workplaces. These systems are often difficult to use, in p...
Jeffrey Nichols, Brandon Rothrock, Duen Horng Chau...
JUCS
2010
130views more  JUCS 2010»
13 years 8 months ago
CAUCE: Model-driven Development of Context-aware Applications for Ubiquitous Computing Environments
: In order to develop context-aware applications for ubiquitous computing environments we have defined an MDA approach that defines three layers of models. The first layer captures...
Ricardo Tesoriero, José A. Gallud, Mar&iacu...
CVPR
1999
IEEE
15 years 6 days ago
On the Intrinsic Reconstruction of Shape from its Symmetries
The main question we address is: what is the minimal information required to generate closed, non-intersecting planar boundaries? For this paper we restrict ‘shape’ to this mea...
Peter J. Giblin, Benjamin B. Kimia
OTM
2007
Springer
14 years 4 months ago
Semantically Resolving Type Mismatches in Scientific Workflows
Scientists are increasingly utilizing Grids to manage large data sets and execute scientific experiments on distributed resources. Scientific workflows are used as means for modeli...
Kheiredine Derouiche, Denis A. Nicole