Sciweavers

894 search results - page 159 / 179
» Experiences from the Architectural Change Process
Sort
View
CCS
2007
ACM
15 years 4 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
VLDB
2004
ACM
124views Database» more  VLDB 2004»
15 years 3 months ago
Automated Statistics Collection in DB2 UDB
The use of inaccurate or outdated database statistics by the query optimizer in a relational DBMS often results in a poor choice of query execution plans and hence unacceptably lo...
Ashraf Aboulnaga, Peter J. Haas, Sam Lightstone, G...
NIPS
1994
14 years 11 months ago
Catastrophic Interference in Human Motor Learning
Biological sensorimotor systems are not static maps that transform input sensory information into output motor behavior. Evidence from many lines of research suggests that their r...
Tom Brashers-Krug, Reza Shadmehr, Emanuel Todorov
JUCS
2010
150views more  JUCS 2010»
14 years 8 months ago
Situation-Aware Community Computing Model for Developing Dynamic Ubiquitous Computing Systems
: For many complex and dynamic ubiquitous services, context-aware cooperation can be a solution. However, the way is not yet clear to make individual objects cooperate with each ot...
Youna Jung, Minsoo Kim
PDSE
2000
96views more  PDSE 2000»
14 years 11 months ago
Applying Distributed Object Technology to Network Planning
The aim of this paper is to describe a generic interface through which a planning tool or design aid can be connected to a telecommunications network. In today's complex and ...
Tertius D. Wessels, Judy M. Bishop