Sciweavers

315 search results - page 60 / 63
» Supporting location-based conditions in access control polic...
Sort
View
VLDB
1993
ACM
112views Database» more  VLDB 1993»
14 years 15 days ago
Specifying and Enforcing Intertask Dependencies
Extensions of the traditional atomic transaction model are needed to support the development of multi-system applications or work ows that access heterogeneous databases and legac...
Paul C. Attie, Munindar P. Singh, Amit P. Sheth, M...
VSGAMES
2010
114views Game Theory» more  VSGAMES 2010»
13 years 6 months ago
Privacy Challenges and Methods for Virtual Classrooms in Second Life Grid and OpenSimulator
—Mass adoption of virtual world platforms for education and training implies efficient management of computational resources. In Second Life Grid and OpenSimulator, commonly used...
Andreas Vilela, Marcio Cardoso, Daniel Martins, Ar...
ICRA
2010
IEEE
158views Robotics» more  ICRA 2010»
13 years 6 months ago
A measurement distribution framework for cooperative navigation using multiple AUVs
Abstract-- In recent years underwater survey and surveillance missions with more than a single Autonomous Underwater Vehicle (AUV) have become more common thanks to more reliable a...
Maurice F. Fallon, Georgios Papadopoulos, John J. ...
MOBIHOC
2003
ACM
14 years 8 months ago
SHARP: a hybrid adaptive routing protocol for mobile ad hoc networks
A central challenge in ad hoc networks is the design of routing protocols that can adapt their behavior to frequent and rapid changes in the network. The performance of proactive ...
Venugopalan Ramasubramanian, Zygmunt J. Haas, Emin...
ENTCS
2007
168views more  ENTCS 2007»
13 years 8 months ago
Bytecode Rewriting in Tom
In this paper, we present a term rewriting based library for manipulating Java bytecode. We define a mapping from bytecode programs to algebraic terms, and we use Tom, an extensi...
Emilie Balland, Pierre-Etienne Moreau, Antoine Rei...