Sciweavers

35 search results - page 7 / 7
» Removing Independently Even Crossings
Sort
View
AOSD
2009
ACM
13 years 10 months ago
Dependent advice: a general approach to optimizing history-based aspects
Many aspects for runtime monitoring are history-based: they contain pieces of advice that execute conditionally, based on the observed execution history. History-based aspects are...
Eric Bodden, Feng Chen, Grigore Rosu
MOBICOM
2004
ACM
13 years 9 months ago
End-to-end performance and fairness in multihop wireless backhaul networks
Wireless IEEE 802.11 networks in residences, small businesses, and public “hot spots” typically encounter the wireline access link (DSL, cable modem, T1, etc.) as the slowest ...
Violeta Gambiroza, Bahareh Sadeghi, Edward W. Knig...
CCS
2006
ACM
13 years 7 months ago
Resiliency policies in access control
We introduce the notion of resiliency policies in the context of access control systems. Such policies require an access control system to be resilient to the absence of users. An...
Ninghui Li, Mahesh V. Tripunitara, Qihua Wang
CIDR
2003
164views Algorithms» more  CIDR 2003»
13 years 5 months ago
Capacity Bound-free Web Warehouse
Web cache technologies have been developed as an extension of CPU cache, by modifying LRU (Least Recently Used) algorithms. Actually in web cache systems, we can use disks and ter...
Yahiko Kambayashi, Kai Cheng
ICIP
2010
IEEE
13 years 1 months ago
Barcode-based calibration of a 1-D blur restoration pipeline
: External Posting Date: October 21, 2010 [Fulltext] Approved for External Publication Internal Posting Date: October 21, 2010 [Fulltext] Barcode-Based Calibration of a 1-D Blur R...
Matthew Gaubatz, Steven J. Simske