Sciweavers

5511 search results - page 1022 / 1103
» Security for Network Places
Sort
View
ICCD
2007
IEEE
183views Hardware» more  ICCD 2007»
14 years 6 months ago
Constraint satisfaction in incremental placement with application to performance optimization under power constraints
We present new techniques for explicit constraint satisfaction in the incremental placement process. Our algorithm employs a Lagrangian Relaxation (LR) type approach in the analyt...
Huan Ren, Shantanu Dutt
WWW
2010
ACM
14 years 4 months ago
Atomate it! end-user context-sensitive automation using heterogeneous information sources on the web
The transition of personal information management (PIM) tools off the desktop to the Web presents an opportunity to augment these tools with capabilities provided by the wealth o...
Max Van Kleek, Brennan Moore, David R. Karger, Pau...
BIRTHDAY
2009
Springer
14 years 3 months ago
Vertical Object Layout and Compression for Fixed Heaps
Research into embedded sensor networks has placed increased focus on the problem of developing reliable and flexible software for microcontroller-class devices. Languages such as ...
Ben Titzer, Jens Palsberg
ISMAR
2009
IEEE
14 years 3 months ago
Dynamic seethroughs: Synthesizing hidden views of moving objects
This paper presents a method to create an illusion of seeing moving objects through occluding surfaces in a video. This illusion is achieved by transferring information from a cam...
Peter Barnum, Yaser Sheikh, Ankur Datta, Takeo Kan...
CIKM
2009
Springer
14 years 3 months ago
SPIDER: a system for scalable, parallel / distributed evaluation of large-scale RDF data
RDF is a data model for representing labeled directed graphs, and it is used as an important building block of semantic web. Due to its flexibility and applicability, RDF has bee...
Hyunsik Choi, Jihoon Son, YongHyun Cho, Min Kyoung...
« Prev « First page 1022 / 1103 Last » Next »