Sciweavers

26496 search results - page 5209 / 5300
» An Approach to Computing Ethics
Sort
View
COMAD
2008
14 years 11 months ago
Runtime Optimization of Continuous Queries
In data stream processing systems, Quality of Service (or QoS) requirements, as specified by users, are extremely important. Unlike in a database management system (DBMS), a query...
Balakumar Kendai, Sharma Chakravarthy
DAGSTUHL
2007
14 years 11 months ago
Lifetime Extension of Higher Class UHF RFID Tags using special Power Management Techniques and Energy Harvesting Devices
Abstract. Enhanced RFID tag technology especially in the UHF frequency range provides extended functionality like high operating range and sensing and monitoring capabilities. Such...
Alex Janek, Christian Steger, Josef Preishuber-Pfl...
DICTA
2008
14 years 11 months ago
Image Reconstruction from Contrast Information
An iterative algorithm for the reconstruction of natural images given only their contrast map is presented. The solution is neuro-physiologically inspired, where the retinal cells...
Asim A. Khwaja, Roland Goecke
FAST
2007
14 years 11 months ago
Disk Failures in the Real World: What Does an MTTF of 1, 000, 000 Hours Mean to You?
Component failure in large-scale IT installations is becoming an ever larger problem as the number of components in a single cluster approaches a million. In this paper, we presen...
Bianca Schroeder, Garth A. Gibson
I3
2007
14 years 11 months ago
Identity: How to name it, How to find it
The main objective of this work is to exploit the relationship between the information findability problem and a subject-based organization of information. Identification of a sub...
Christo Dichev, Darina Dicheva, Jan Fischer
« Prev « First page 5209 / 5300 Last » Next »