Sciweavers

2061 search results - page 349 / 413
» Authorization for Metacomputing Applications
Sort
View
EDBT
2008
ACM
161views Database» more  EDBT 2008»
16 years 21 days ago
Load distribution of analytical query workloads for database cluster architectures
Enterprises may have multiple database systems spread across the organization for redundancy or for serving different applications. In such systems, query workloads can be distrib...
Thomas Phan, Wen-Syan Li
ICIAP
2001
Springer
16 years 20 days ago
Bayesian Face Recognition with Deformable Image Models
We propose a novel representation for characterizing image differences using a deformable technique for obtaining pixel-wise correspondences. This representation, which is based o...
Baback Moghaddam, Chahab Nastar, Alex Pentland
82
Voted
ICSE
2005
IEEE-ACM
16 years 19 days ago
Real-time specification patterns
Embedded systems are pervasive and frequently used for critical systems with time-dependent functionality. Dwyer et al. have developed qualitative specification patterns to facili...
Sascha Konrad, Betty H. C. Cheng
114
Voted
ICFP
2006
ACM
16 years 16 days ago
Algebraic fusion of functions with an accumulating parameter and its improvement
We present a unifying solution to the problem of fusion of functions, where both the producer function and the consumer function have one accumulating parameter. The key idea in t...
Shin-ya Katsumata, Susumu Nishimura
PERCOM
2007
ACM
16 years 4 days ago
Securing distributed data storage and retrieval in sensor networks
Sensor networks have been an attractive platform for pervasive computing and communication. Due to the lack of physical protection, however, sensor networks are vulnerable to atta...
Nalin Subramanian, Chanjun Yang, Wensheng Zhang