Sciweavers

370 search results - page 45 / 74
» An Approach to Ad hoc Cloud Computing
Sort
View
HICSS
2007
IEEE
172views Biometrics» more  HICSS 2007»
15 years 4 months ago
Support for Computer Forensics Examination Planning with Domain Modeling: A Report of One Experiment Trial
In any forensic investigation, planning and analysis activities are required in order to determine what digital media will be seized, what types of information will be sought in t...
Alfred C. Bogen, David A. Dampier, Jeffrey C. Carv...
ICFP
2001
ACM
15 years 9 months ago
Macros as Multi-Stage Computations: Type-Safe, Generative, Binding Macros in MacroML
With few exceptions, macros have traditionally been viewed as operations on syntax trees or even on plain strings. This view makes macros seem ad hoc, and is at odds with two desi...
Steven E. Ganz, Amr Sabry, Walid Taha
DASFAA
2004
IEEE
110views Database» more  DASFAA 2004»
15 years 1 months ago
Optimising Mediator Queries to Distributed Engineering Systems
Data and computations of a CAD system have been wrapped by a mediator system using CORBA's IIOP Protocol. This allows ad hoc declarative mediator queries to be translated into...
Mattias Nyström, Tore Risch
ICPR
2010
IEEE
15 years 1 months ago
A Hypothesis Testing Approach for Fluorescent Blob Identification
Template matching is a common approach for identifying fluorescent objects within a biological image. But how to decide a threshold value for the purpose of justifying the goodness...
Le-Shin Wu, Sidney Shaw
MOBIHOC
2000
ACM
15 years 2 months ago
DEAPspace: transient ad-hoc networking of pervasive devices
The rapid spreading of mobile computerized devices marks the beginning of a new computing paradigm characterized by ad hoc networking and spontaneous interaction, taking place tra...
Reto Hermann, Dirk Husemann, Michael Moser, Michae...