Sciweavers

733 search results - page 94 / 147
» A Logic Programming View of Authorization in Distributed Sys...
Sort
View
ENTCS
2008
116views more  ENTCS 2008»
15 years 3 months ago
Computational Origami Construction as Constraint Solving and Rewriting
Computational origami is the computer assisted study of mathematical and computational aspects of origami. An origami is constructed by a finite sequence of fold steps, each consi...
Tetsuo Ida, Mircea Marin, Hidekazu Takahashi, Fado...
WWW
2009
ACM
16 years 4 months ago
A geographical analysis of knowledge production in computer science
We analyze knowledge production in Computer Science by means of coauthorship networks. For this, we consider 30 graduate programs of different regions of the world, being 8 progra...
Alberto H. F. Laender, Guilherme Vale Menezes, Niv...
HICSS
1994
IEEE
155views Biometrics» more  HICSS 1994»
15 years 8 months ago
Concurrent Simulation and Control of Robot Tasks
In the area of telerobotics, where remote systems are to be controlled, it is helpful to plan subsequent operations based on as much relevant data as possible. The simulation of t...
Ulrich Mehlhaus
VLDB
1998
ACM
102views Database» more  VLDB 1998»
15 years 8 months ago
A Database System for Real-Time Event Aggregation in Telecommunication
Telecommunication networks process verylarge numbers of events in real time. In this environment, database applications demand both high throughput (at reasonable costs), and pred...
Jerry Baulier, Stephen Blott, Henry F. Korth, Abra...
133
Voted
RTCSA
2005
IEEE
15 years 9 months ago
FPGA-Based Content Protection System for Embedded Consumer Electronics
We propose a new architecture for a content protection system that conceals confidential data and algorithms in an FPGA as electrical circuits. This architecture is designed for a...
Hiroyuki Yokoyama, Kenji Toda