Sciweavers

2060 search results - page 302 / 412
» The Composition of Event-B Models
Sort
View
113
Voted
SRDS
2006
IEEE
15 years 10 months ago
How To Safeguard Your Sensitive Data
In order to safeguard a sensitive database, we must ensure both its privacy and its longevity. However, privacy and longevity tend to be competing objectives. We show how to desig...
Bob Mungamuru, Hector Garcia-Molina, Subhasish Mit...
NORDICHI
2006
ACM
15 years 10 months ago
Affordances and constraints in screen-based musical instruments
The ixi software is an ongoing interdisciplinary research project. It focuses on the creation of screen-based interfaces as digital musical instruments. The notion of situated cog...
Thor Magnusson
ICMCS
2005
IEEE
172views Multimedia» more  ICMCS 2005»
15 years 10 months ago
A Study of Synthesizing New Human Motions from Sampled Motions Using Tensor Decomposition
This paper applies an algorithm, based on Tensor Decomposition, to a new synthesis application: by using sampled motions of people of different ages under different emotional stat...
Rovshan Kalanov, Jieun Cho, Jun Ohya
RTCSA
2005
IEEE
15 years 10 months ago
Research Issues in the Development of Context-Aware Middleware Architectures
Context-aware middleware encompasses uniform ions and reliable services for common operations, supports for most of the tasks involved in dealing with context, and thus simplifyin...
Hung Quoc Ngo, Anjum Shehzad, Kim Anh Pham Ngoc, S...
PPOPP
2005
ACM
15 years 10 months ago
Composable memory transactions
Writing concurrent programs is notoriously difficult, and is of increasing practical importance. A particular source of concern is n correctly-implemented concurrency abstraction...
Tim Harris, Simon Marlow, Simon L. Peyton Jones, M...