Sciweavers

439 search results - page 37 / 88
» Communication Via Decentralized Processing
Sort
View
SACMAT
2010
ACM
15 years 2 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
AMAST
2000
Springer
15 years 2 months ago
The Algebra of Multi-tasking
Modelling multi-tasking behaviour is an important phase of real-time system design. It is shown how task scheduling principles can be captured in a CCS-based process algebra via ex...
Colin J. Fidge
CORR
2010
Springer
249views Education» more  CORR 2010»
14 years 9 months ago
Lower Bounds on Near Neighbor Search via Metric Expansion
In this paper we show how the complexity of performing nearest neighbor (NNS) search on a metric space is related to the expansion of the metric space. Given a metric space we loo...
Rina Panigrahy, Kunal Talwar, Udi Wieder
VLDB
2008
ACM
147views Database» more  VLDB 2008»
15 years 10 months ago
PicShark: mitigating metadata scarcity through large-scale P2P collaboration
With the commoditization of digital devices, personal information and media sharing is becoming a key application on the pervasive Web. In such a context, data annotation rather th...
Philippe Cudré-Mauroux, Adriana Budura, Manfred H...
AVSS
2006
IEEE
15 years 3 months ago
Optimal Power Scheduling for Data Fusion in Inhomogeneous Wireless Sensor Networks
We consider the problem of optimal power scheduling for the decentralized detection of a deterministic signal in an inhomogeneous wireless sensor network. The observation noise at...
Thakshila Wimalajeewa, Sudharman K. Jayaweera