Sciweavers

3095 search results - page 552 / 619
» Ubiquitous presence systems
Sort
View
CORR
2009
Springer
137views Education» more  CORR 2009»
13 years 6 months ago
Choreographies with Secure Boxes and Compromised Principals
We equip choreography-level session descriptions with a simple abstraction of a security infrastructure. Message components may be enclosed within (possibly nested) "boxes&quo...
Marco Carbone, Joshua D. Guttman
SIGMOD
2011
ACM
220views Database» more  SIGMOD 2011»
12 years 11 months ago
Zephyr: live migration in shared nothing databases for elastic cloud platforms
Multitenant data infrastructures for large cloud platforms hosting hundreds of thousands of applications face the challenge of serving applications characterized by small data foo...
Aaron J. Elmore, Sudipto Das, Divyakant Agrawal, A...
BIRTHDAY
2011
Springer
12 years 8 months ago
Algorithmic Aspects of Risk Management
Abstract. Risk analysis has been used to manage the security of systems for several decades. However, its use has been limited to offline risk computation and manual response. In c...
Ashish Gehani, Lee Zaniewski, K. Subramani
ICCV
1999
IEEE
14 years 10 months ago
Vision in Bad Weather
Current vision systems are designed to perform in clear weather. Needless to say, in any outdoor application, there is no escape from "bad" weather. Ultimately, computer...
Shree K. Nayar, Srinivasa G. Narasimhan
GIS
2006
ACM
14 years 9 months ago
Optimization of multiple continuous queries over streaming satellite data
Remotely sensed data, in particular satellite imagery, play many important roles in environmental applications and models. In particular applications that study (rapid) changes in...
Quinn Hart, Michael Gertz