Sciweavers

1927 search results - page 299 / 386
» An Access Control Model for Location based Services
Sort
View
123
Voted
LADC
2007
Springer
15 years 7 months ago
Security Patterns and Secure Systems Design
Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Patterns combine experience and good practices t...
Eduardo B. Fernández
MM
2003
ACM
146views Multimedia» more  MM 2003»
15 years 6 months ago
Supporting timeliness and accuracy in distributed real-time content-based video analysis
Real-time content-based access to live video data requires content analysis applications that are able to process the video data at least as fast as the video data is made availab...
Viktor S. Wold Eide, Frank Eliassen, Ole-Christoff...
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
15 years 8 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...
ICLP
1999
Springer
15 years 5 months ago
Concurrency in Prolog Using Threads and a Shared Database
Concurrency in Logic Programming has received much attention in the past. One problem with many proposals, when applied to Prolog, is that they involve large modifications to the...
Manuel Carro, Manuel V. Hermenegildo
PERCOM
2010
ACM
15 years 5 months ago
Pervasive maps: Explore and interact with pervasive environments
—Efficient discovery of nearby devices and services is one of the preconditions to obtain a usable pervasive environment. Typical user interfaces in these environments hide the ...
Geert Vanderhulst, Kris Luyten, Karin Coninx