Sciweavers

1036 search results - page 96 / 208
» Ubiquitous Verification of Ubiquitous Systems
Sort
View
SUTC
2006
IEEE
14 years 4 months ago
An Indoor Localization Mechanism Using Active RFID Tag
The location-aware technology and its application are prerequisite to realize the ubiquitous computing. However, another special system for indoor localization is needed in the co...
Guang-yao Jin, Xiao-Yi Lu, Myong-Soon Park
CCGRID
2003
IEEE
14 years 1 months ago
Kernel Level Speculative DSM
Interprocess communication (IPC) is ubiquitous in today's computing world. One of the simplest mechanisms for IPC is shared memory. We present a system that enhances the Syst...
Cristian Tapus
TODS
2012
12 years 15 days ago
A survey of B-tree logging and recovery techniques
B-trees have been ubiquitous in database management systems for several decades, and they serve in many other storage systems as well. Their basic structure and their basic operat...
Goetz Graefe
ECAI
2006
Springer
14 years 1 months ago
Compact Representation of Sets of Binary Constraints
Abstract. We address the problem of representing big sets of binary constraints compactly. Binary constraints in the form of 2literal clauses are ubiquitous in propositional formul...
Jussi Rintanen
JUCS
2008
112views more  JUCS 2008»
13 years 10 months ago
Knowledge Processing in Intelligent Systems
Abstract: Intelligence and Knowledge play more and more important roles in building complex intelligent systems, for instance, intrusion detection systems, and operational analysis...
Longbing Cao, Ngoc Thanh Nguyen