Sciweavers

362 search results - page 44 / 73
» An access control model for simplifying constraint expressio...
Sort
View
VLDB
2007
ACM
147views Database» more  VLDB 2007»
15 years 12 months ago
A General Framework for Modeling and Processing Optimization Queries
An optimization query asks for one or more data objects that maximize or minimize some function over the data set. We propose a general class of queries, model-based optimization ...
Michael Gibas, Ning Zheng, Hakan Ferhatosmanoglu
ACSAC
2006
IEEE
15 years 5 months ago
A Module System for Isolating Untrusted Software Extensions
With the recent advent of dynamically extensible software systems, in which software extensions may be dynamically loaded into the address space of a core application to augment i...
Philip W. L. Fong, Simon A. Orr
ICRA
2010
IEEE
105views Robotics» more  ICRA 2010»
14 years 10 months ago
Towards passive object on-orbit manipulation by cooperating free-flying robots
——Space exploitation will require efficient techniques for manipulating passive objects on orbit. This work presents a manipulation concept that utilizes both the on-off thruste...
Georgios Rekleitis, Evangelos Papadopoulos
86
Voted
WSCG
2004
143views more  WSCG 2004»
15 years 1 months ago
View Dependent Stochastic Sampling for Efficient Rendering of Point Sampled Surfaces
In this paper we present a new technique for rendering very large datasets representing point-sampled surfaces. Rendering efficiency is considerably improved by using stochastic s...
Sushil Bhakar, Liang Luo, Sudhir P. Mudur
CL
2010
Springer
14 years 12 months ago
Isolating untrusted software extensions by custom scoping rules
In a modern programming language, scoping rules determine the visibility of names in various regions of a program [15]. In this work, we examine the idea of allowing an applicatio...
Philip W. L. Fong, Simon A. Orr