Sciweavers

1192 search results - page 195 / 239
» Computing Weakest Readings
Sort
View
SENSYS
2003
ACM
15 years 7 months ago
SIA: secure information aggregation in sensor networks
Sensor networks promise viable solutions to many monitoring problems. However, the practical deployment of sensor networks faces many challenges imposed by real-world demands. Sen...
Bartosz Przydatek, Dawn Xiaodong Song, Adrian Perr...
BIRTHDAY
2003
Springer
15 years 7 months ago
On the Pagination of Complex Documents
The pagination problem of complex documents is in placing text and floating objects on pages in such a way that each object appears close to, but not before, its text reference. ...
Anne Brüggemann-Klein, Rolf Klein, Stefan Woh...
ISORC
2002
IEEE
15 years 6 months ago
IKE 2-Implementing the Stateful Distributed Object Paradigm
— This paper describes IKE 2, which is distributed object computing middleware that supports the creation of interoperable realtime distributed applications. These applications a...
J. Russell Noseworthy
SPAA
2010
ACM
15 years 6 months ago
TLRW: return of the read-write lock
TL2 and similar STM algorithms deliver high scalability based on write-locking and invisible readers. In fact, no modern STM design locks to read along its common execution path b...
David Dice, Nir Shavit
HUC
2009
Springer
15 years 6 months ago
Eye movement analysis for activity recognition
In this work we investigate eye movement analysis as a new modality for recognising human activity. We devise 90 different features based on the main eye movement characteristics:...
Andreas Bulling, Jamie A. Ward, Hans Gellersen, Ge...