Sciweavers

175 search results - page 35 / 35
» One Update for all Moving Objects at a Timestamp
Sort
View
CSREASAM
2006
13 years 6 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
ICFP
2008
ACM
14 years 4 months ago
Transactional events for ML
Transactional events (TE) are an approach to concurrent programming that enriches the first-class synchronous message-passing of Concurrent ML (CML) with a combinator that allows ...
Laura Effinger-Dean, Matthew Kehrt, Dan Grossman
EDBT
2008
ACM
118views Database» more  EDBT 2008»
14 years 5 months ago
Robustness in automatic physical database design
Automatic physical database design tools rely on "what-if" interfaces to the query optimizer to estimate the execution time of the training query workload under differen...
Kareem El Gebaly, Ashraf Aboulnaga
HICSS
2003
IEEE
193views Biometrics» more  HICSS 2003»
13 years 10 months ago
Ambient computing applications: an experience with the SPREAD approach
Todays, we assist to the explosive development of mobile computing devices like PDAs and cell-phones, the integration of embedded intelligence (like Web server) in more and more c...
Paul Couderc, Michel Banâtre
JETAI
2000
302views more  JETAI 2000»
13 years 4 months ago
Consciousness, intentionality and intelligence: some foundational issues for artificial intelligence
: We present three fundamental questions concerning minds. These are about consciousness, intentionality and intelligence. After we present the fundamental framework that has shape...
Murat Aydede, Guven Guzeldere