Sciweavers

12493 search results - page 2447 / 2499
» Information Access in the Web
Sort
View
VEE
2005
ACM
199views Virtualization» more  VEE 2005»
15 years 6 months ago
Escape analysis in the context of dynamic compilation and deoptimization
In object-oriented programming languages, an object is said to escape the method or thread in which it was created if it can also be accessed by other methods or threads. Knowing ...
Thomas Kotzmann, Hanspeter Mössenböck
WOWMOM
2005
ACM
184views Multimedia» more  WOWMOM 2005»
15 years 6 months ago
ALCA: A New Scheme for Power Control on 802.11 Ad Hoc Networks
— This paper presents the ALCA (Asymmetric Link Collision Avoidance) protocol. ALCA was designed to deal with a known deficiency of the Basic Scheme [1] for power control in 802...
Alexandre Andrade Pires, José Ferreira de R...
ACISP
2005
Springer
15 years 6 months ago
RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management
Abstract. RFID tags are tiny, inexpensive, inductively powered computers that are going to replace bar codes on many products, but which have many other uses as well. For example, ...
Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenb...
AMIRE
2005
Springer
198views Robotics» more  AMIRE 2005»
15 years 6 months ago
Extending the Temporal Horizon of Autonomous Robots
Abstract. We introduce mathematically rigorous metrics on agent experiences having various temporal horizons. Sensorimotor variables accessible to the agent are treated as informat...
Chrystopher L. Nehaniv, Naeem Assif Mirza, Kerstin...
BTW
2005
Springer
113views Database» more  BTW 2005»
15 years 6 months ago
A Learning Optimizer for a Federated Database Management System
: Optimizers in modern DBMSs utilize a cost model to choose an efficient query execution plan (QEP) among all possible ones for a given query. The accuracy of the cost estimates de...
Stephan Ewen, Michael Ortega-Binderberger, Volker ...
« Prev « First page 2447 / 2499 Last » Next »