Sciweavers

5448 search results - page 950 / 1090
» Breakpoints and Time in Distributed Computations
Sort
View
POPL
2004
ACM
16 years 1 months ago
Asynchronous and deterministic objects
We present in this article a precise security model for data confidentiality in the framework of asynchronous and deterministic objects. Our underlying programming model is based ...
Denis Caromel, Ludovic Henrio, Bernard P. Serpette
185
Voted
SIGMOD
2005
ACM
157views Database» more  SIGMOD 2005»
16 years 27 days ago
Meta-data version and configuration management in multi-vendor environments
Nearly all components that comprise modern information technology, such as Computer Aided Software Engineering (CASE) tools, Enterprise Application Integration (EAI) environments,...
John R. Friedrich
SIGMOD
2003
ACM
121views Database» more  SIGMOD 2003»
16 years 27 days ago
An environmental sensor network to determine drinking water quality and security
Finding patterns in large, real, spatio/temporal data continues to attract high interest (e.g., sales of products over space and time, patterns in mobile phone users; sensor netwo...
Anastassia Ailamaki, Christos Faloutsos, Paul S. F...
109
Voted
ICIAP
2005
ACM
16 years 26 days ago
3D Surface Reconstruction from Scattered Data Using Moving Least Square Method
This paper presents an efficient implementation of moving least square(MLS) approximation for 3D surface reconstruction. The smoothness of the MLS is mainly determined by the weigh...
Soon-Jeong Ahn, Jaechil Yoo, Byung-Gook Lee, Joon-...
ICSE
2004
IEEE-ACM
16 years 25 days ago
GlueQoS: Middleware to Sweeten Quality-of-Service Policy Interactions
A holy grail of component-based software engineering is "write-once, reuse everywhere". However, in modern distributed, component-based systems supporting emerging appli...
Eric Wohlstadter, Stefan Tai, Thomas A. Mikalsen, ...