Sciweavers

5790 search results - page 271 / 1158
» Distributed programming with distributed authorization
Sort
View
VLDB
1998
ACM
102views Database» more  VLDB 1998»
15 years 7 months ago
A Database System for Real-Time Event Aggregation in Telecommunication
Telecommunication networks process verylarge numbers of events in real time. In this environment, database applications demand both high throughput (at reasonable costs), and pred...
Jerry Baulier, Stephen Blott, Henry F. Korth, Abra...
IDEAL
2010
Springer
15 years 1 months ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...
CSCW
2011
ACM
14 years 10 months ago
It's about time: confronting latency in the development of groupware systems
The presence of network latency leads to usability problems in distributed groupware applications. Example problems include difficulty synchronizing tightly-coupled collaboration...
Cheryl Savery, T. C. Nicholas Graham
ICDE
2009
IEEE
119views Database» more  ICDE 2009»
15 years 10 months ago
Deductive Framework for Programming Sensor Networks
—Developing powerful paradigms for programming sensor networks is critical to realize the full potential of sensor networks as collaborative data processing engines. In this arti...
Himanshu Gupta, Xianjin Zhu, Xiang Xu
GPEM
2000
121views more  GPEM 2000»
15 years 3 months ago
Bayesian Methods for Efficient Genetic Programming
ct. A Bayesian framework for genetic programming GP is presented. This is motivated by the observation that genetic programming iteratively searches populations of fitter programs ...
Byoung-Tak Zhang