Sciweavers

225 search results - page 41 / 45
» Design for Constraint Violation Detection in Safety-Critical...
Sort
View
SIGMOD
2010
ACM
207views Database» more  SIGMOD 2010»
14 years 11 months ago
Leveraging spatio-temporal redundancy for RFID data cleansing
Radio Frequency Identification (RFID) technologies are used in many applications for data collection. However, raw RFID readings are usually of low quality and may contain many an...
Haiquan Chen, Wei-Shinn Ku, Haixun Wang, Min-Te Su...
DAWAK
2009
Springer
14 years 9 months ago
Towards a Modernization Process for Secure Data Warehouses
Data Warehouses (DW) manage crucial enterprise information used for the decision making process which has to be protected from unauthorized accesses. However, security constraints ...
Carlos Blanco, Ricardo Pérez-Castillo, Arnu...
SASO
2008
IEEE
15 years 6 months ago
Cells Are Plausible Targets for High-Level Spatial Languages
—High level languages greatly increase the power of a programmer at the cost of programs that consume more s than those written at a lower level of abstraction. This inefficienc...
Jacob Beal, Jonathan Bachrach
91
Voted
AOSE
2005
Springer
15 years 5 months ago
Operational Modelling of Agent Autonomy: Theoretical Aspects and a Formal Language
Autonomy has always been conceived as one of the defining attributes of intelligent agents. While the past years have seen considerable progress regarding theoretical aspects of a...
Gerhard Weiß, Felix A. Fischer, Matthias Nic...
80
Voted
UIST
2006
ACM
15 years 5 months ago
Pen-top feedback for paper-based interfaces
Current paper-based interfaces such as PapierCraft, provide very little feedback and this limits the scope of possible interactions. So far, there has been little systematic explo...
Chunyuan Liao, François Guimbretière...