Sciweavers

526 search results - page 79 / 106
» Type Abstractions of Name-Passing Processes
Sort
View
BTW
2009
Springer
146views Database» more  BTW 2009»
14 years 3 months ago
Towards Flash Disk Use in Databases - Keeping Performance While Saving Energy?
Abstract: Green computing or energy saving when processing information is primarily considered a task of processor development. We, however, advocate that a holistic approach is ne...
Theo Härder, Karsten Schmidt 0002, Yi Ou, Seb...
MKM
2009
Springer
14 years 3 months ago
From Tessellations to Table Interpretation
The extraction of the relations of nested table headers to content cells is automated with a view to constructing narrow domain ontologies of semistructured web data. A taxonomy of...
Ramana C. Jandhyala, Mukkai S. Krishnamoorthy, Geo...
ICRA
2008
IEEE
201views Robotics» more  ICRA 2008»
14 years 3 months ago
Hierarchical distributed control for search and tracking by heterogeneous aerial robot networks
Abstract—This paper presents a hierarchical control architecture that enables cooperative surveillance by a heterogeneous aerial robot network comprised of mothership unmanned ai...
Jack Elston, Eric W. Frew
ISSRE
2008
IEEE
14 years 3 months ago
Automated Generation of Pointcut Mutants for Testing Pointcuts in AspectJ Programs
Aspect-Oriented Programming (AOP) provides new modularization of software systems by encapsulating crosscutting concerns. AspectJ, an AOP language, uses abstractions such as point...
Prasanth Anbalagan, Tao Xie
ACISP
2008
Springer
14 years 3 months ago
Advanced Permission-Role Relationship in Role-Based Access Control
Abstract. Permission-role assignment is an important issue in rolebased access control (RBAC). There are two types of problems that may arise in permission-role assignment. One is ...
Min Li, Hua Wang, Ashley W. Plank, Jianming Yong