Sciweavers

2726 search results - page 452 / 546
» Application security support in the operating system kernel
Sort
View
IPTPS
2004
Springer
15 years 3 months ago
Diminished Chord: A Protocol for Heterogeneous Subgroup Formation in Peer-to-Peer Networks
In most of the P2P systems developed so far, all nodes play essentially the same role. In some applications, however, different machine capabilities or owner preferences may mean ...
David R. Karger, Matthias Ruhl
EDBT
2008
ACM
178views Database» more  EDBT 2008»
15 years 10 months ago
An inductive database and query language in the relational model
In the demonstration, we will present the concepts and an implementation of an inductive database ? as proposed by Imielinski and Mannila ? in the relational model. The goal is to...
Lothar Richter, Jörg Wicker, Kristina Kessler...
KSEM
2009
Springer
15 years 4 months ago
On Optimization of Predictions in Ontology-Driven Situation Awareness
Systems supporting situation awareness in large-scale control systems, such as, e. g., encountered in the domain of road traffic management, pursue the vision of allowing human ope...
Norbert Baumgartner, Wolfgang Gottesheim, Stefan M...
NOSSDAV
2005
Springer
15 years 3 months ago
Meeting CPU constraints by delaying playout of multimedia tasks
Multimedia applications today constitute a significant fraction of the workload running on portable devices such as mobile phones, PDAs and MP3 players. However, the processors i...
Balaji Raman, Samarjit Chakraborty, Wei Tsang Ooi
HICSS
2003
IEEE
99views Biometrics» more  HICSS 2003»
15 years 3 months ago
Financial Model-Base Construction for Flexible Model Manipulation of Models and Solvers
As financial markets are volatile and rapidly changing, preciseness and agility in price evaluation and risk assessment in the portfolios are more important and decision support s...
Keun-Woo Lee, Soon-Young Huh