Sciweavers

6554 search results - page 1208 / 1311
» Constraint Logic Programming
Sort
View
100
Voted
HT
2000
ACM
15 years 8 months ago
Making a successful case for a hypertextual doctoral dissertation
In August of 1998 I completed the first hypertextual dissertation at Rensselaer Polytechnic Institute. The dissertation was a case study applying methods of rhetorical analysis an...
Christine Boese
140
Voted
PODS
2000
ACM
137views Database» more  PODS 2000»
15 years 8 months ago
Query Containment for Data Integration Systems
The problem of query containment is fundamental to many aspects of database systems, including query optimization, determining independence of queries from updates, and rewriting ...
Todd D. Millstein, Alon Y. Levy, Marc Friedman
123
Voted
DATE
2010
IEEE
148views Hardware» more  DATE 2010»
15 years 8 months ago
Scoped identifiers for efficient bit aligned logging
Abstract--Detailed diagnostic data is a prerequisite for debugging problems and understanding runtime performance in distributed wireless embedded systems. Severe bandwidth limitat...
Roy Shea, Mani B. Srivastava, Young Cho
107
Voted
ACSAC
1999
IEEE
15 years 7 months ago
Security Relevancy Analysis on the Registry of Windows NT 4.0
Many security breaches are caused by inappropriate inputs crafted by people with malicious intents. To enhance the system security, we need either to ensure that inappropriate inp...
Wenliang Du, Praerit Garg, Aditya P. Mathur
122
Voted
ICRA
1999
IEEE
146views Robotics» more  ICRA 1999»
15 years 7 months ago
Planning Tracking Motions for an Intelligent Virtual Camera
We consider the problem of automatically generating viewpoint motions for a virtual camera tracking a moving target. Given the target's trajectory, we plan the motion of a ca...
Tsai-Yen Li, Tzong-Hann Yu
« Prev « First page 1208 / 1311 Last » Next »