Sciweavers

882 search results - page 113 / 177
» Visibility-driven transfer functions
Sort
View
SIGMOD
2009
ACM
161views Database» more  SIGMOD 2009»
14 years 9 months ago
Cross-tier, label-based security enforcement for web applications
This paper presents SELinks, a programming language focused on building secure multi-tier web applications. SELinks provides a uniform programming model, in the style of LINQ and ...
Brian J. Corcoran, Nikhil Swamy, Michael W. Hicks
MSWIM
2004
ACM
14 years 2 months ago
An enhanced HCF for IEEE 802.11e wireless networks
In this paper the behavior of the upcoming MAC protocol for wireless LANs IEEE 802.11e is investigated. Based on the results, we propose an enhancement for Hybrid Coordination Fun...
Balasubramanian Appiah Venkatakrishnan, S. Selvake...
SIGMOD
2010
ACM
598views Database» more  SIGMOD 2010»
14 years 1 months ago
Ricardo: integrating R and Hadoop
Many modern enterprises are collecting data at the most detailed level possible, creating data repositories ranging from terabytes to petabytes in size. The ability to apply sophi...
Sudipto Das, Yannis Sismanis, Kevin S. Beyer, Rain...
ICRA
1998
IEEE
101views Robotics» more  ICRA 1998»
14 years 1 months ago
An Approach to Reduction of Hysteresis in Smart Materials
This paper addresses the problem of reducing the hysteresis found in the actuation of most smart materials. They are divided in two groups: systems with no saturation (e.g. piezoe...
Juan Manuel Cruz-Hernández, Vincent Hayward
ICCD
1994
IEEE
69views Hardware» more  ICCD 1994»
14 years 1 months ago
Optimal Design of Self-Damped Lossy Transmission Lines for Multichip Modules
This paper presents a simple and robust method of designing the lossy-transmission-line interconnects in a network for multichip modules. This method uses wire-sizing entirely to ...
Jimmy Shinn-Hwa Wang, Wayne Wei-Ming Dai