Sciweavers

4340 search results - page 807 / 868
» Designing for change
Sort
View
GRID
2005
Springer
15 years 5 months ago
A credential renewal service for long-running jobs
— Jobs on the Grid require security credentials throughout their run for accessing secure Grid resources, such as GridFTP data repositories. However, delegating long-lived creden...
Daniel Kouril, Jim Basney
ICISS
2005
Springer
15 years 5 months ago
Event Detection in Multilevel Secure Active Databases
The event-condition-action paradigm (also known as triggers or rules) is a powerful technology. It gives a database “active” capabilities – the ability to react automatically...
Indrakshi Ray, Wei Huang
ICMI
2005
Springer
267views Biometrics» more  ICMI 2005»
15 years 5 months ago
XfaceEd: authoring tool for embodied conversational agents
In this paper, XfaceEd, our open source, platform independent tool for authoring 3D embodied conversational agents (ECAs) is presented. Following MPEG-4 Facial Animation (FA) stan...
Koray Balci
86
Voted
LOCA
2005
Springer
15 years 5 months ago
The GETA Sandals: A Footprint Location Tracking System
This paper presents the design, implementation, and evaluation of a footprintbased indoor location system on traditional Japanese GETA sandals. Our footprint location system can s...
Kenji Okuda, Shun-yuan Yeh, Chon-in Wu, Keng-hao C...
VLDB
2005
ACM
140views Database» more  VLDB 2005»
15 years 5 months ago
Loadstar: Load Shedding in Data Stream Mining
In this demo, we show that intelligent load shedding is essential in achieving optimum results in mining data streams under various resource constraints. The Loadstar system intro...
Yun Chi, Haixun Wang, Philip S. Yu