Sciweavers

7623 search results - page 1316 / 1525
» Constructive Volume Modeling
Sort
View
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
15 years 8 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
HT
1998
ACM
15 years 8 months ago
Enforcing Strong Object Typing in Flexible Hypermedia
The presentation layer of hypermedia systems could benefit from standard object querying functionality and this is most effective if strong typing is enforced. By strong typing we...
Pedro Furtado, Henrique Madeira
AMET
1998
Springer
15 years 8 months ago
Bidding Strategies for Trading Agents in Auction-Based Tournaments
Abstract. Auction-based electronic commerce is an increasingly interesting domain for AI researchers. In this paper we present an attempt towards the construction of trading agents...
Pere Garcia, Eduardo Giménez, Lluis Godo, J...
SIGMOD
1998
ACM
180views Database» more  SIGMOD 1998»
15 years 8 months ago
Integration of Heterogeneous Databases Without Common Domains Using Queries Based on Textual Similarity
Most databases contain “name constants” like course numbers, personal names, and place names that correspond to entities in the real world. Previous work in integration of het...
William W. Cohen
ECAI
1998
Springer
15 years 8 months ago
Optimal Scheduling of Dynamic Progressive Processing
Progressive processing allows a system to satisfy a set of requests under time pressure by limiting the amount of processing allocated to each task based on a predefined hierarchic...
Abdel-Illah Mouaddib, Shlomo Zilberstein
« Prev « First page 1316 / 1525 Last » Next »