Sciweavers

2624 search results - page 507 / 525
» The 2LIP model and its implementations
Sort
View
GCC
2003
Springer
14 years 2 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
PLDI
2010
ACM
14 years 1 months ago
Finding low-utility data structures
Many opportunities for easy, big-win, program optimizations are missed by compilers. This is especially true in highly layered Java applications. Often at the heart of these misse...
Guoqing Xu, Nick Mitchell, Matthew Arnold, Atanas ...
MASA
2001
Springer
14 years 1 months ago
Distributed Shared Agent Representations
Abstract 1 Different definitions of agents use concepts such as autonomy, pro-activity, reactivity, social abilities, and intentional models. Very few (if any), however, refer to...
Frances M. T. Brazier, Maarten van Steen, Niek J. ...
CVPR
2007
IEEE
14 years 10 months ago
Topology matching for 3D video compression
This paper presents a new technique to reduce the storage cost of high quality 3D video. In 3D video [12], a sequence of 3D objects represents scenes in motion. Every frame is com...
Tony Tung, Francis Schmitt, Takashi Matsuyama
ICDE
2008
IEEE
149views Database» more  ICDE 2008»
14 years 10 months ago
Sharoes: A Data Sharing Platform for Outsourced Enterprise Storage Environments
Abstract-- With fast paced growth of digital data and exploding storage management costs, enterprises are looking for new ways to effectively manage their data. One such cost-effec...
Aameek Singh, Ling Liu