Sciweavers

1791 search results - page 308 / 359
» Behavioral Operations
Sort
View
HICSS
2003
IEEE
193views Biometrics» more  HICSS 2003»
15 years 5 months ago
Ambient computing applications: an experience with the SPREAD approach
Todays, we assist to the explosive development of mobile computing devices like PDAs and cell-phones, the integration of embedded intelligence (like Web server) in more and more c...
Paul Couderc, Michel Banâtre
IDEAS
2003
IEEE
117views Database» more  IDEAS 2003»
15 years 5 months ago
A Multi-Resolution Block Storage Model for Database Design
We propose a new storage model called MBSM (Multiresolution Block Storage Model) for laying out tables on disks. MBSM is intended to speed up operations such as scans that are typ...
Jingren Zhou, Kenneth A. Ross
NSPW
2003
ACM
15 years 5 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
SRDS
1999
IEEE
15 years 4 months ago
Formal Hazard Analysis of Hybrid Systems in cTLA
Hybrid systems like computer-controlled chemical plants are typical safety critical distributed systems. In present practice, the safety of hybrid systems is guaranteed by hazard ...
Peter Herrmann, Heiko Krumm
SRDS
1998
IEEE
15 years 4 months ago
A Data Allocation Algorithm for Distributed Hypermedia Documents
A major cost in executing queries in a distributed database system is the data transfer cost incurred in transferring relations (fragments) accessed by a query from different site...
Siu-Kai So, Ishfaq Ahmad, Kamalakar Karlapalem