Sciweavers

9581 search results - page 1713 / 1917
» On Ubiquitous Integrated Computing
Sort
View
SSDBM
2008
IEEE
131views Database» more  SSDBM 2008»
15 years 11 months ago
Linked Bernoulli Synopses: Sampling along Foreign Keys
Random sampling is a popular technique for providing fast approximate query answers, especially in data warehouse environments. Compared to other types of synopses, random sampling...
Rainer Gemulla, Philipp Rösch, Wolfgang Lehne...
TABLETOP
2008
IEEE
15 years 11 months ago
On top of tabletop: A virtual touch panel display
In the real world, a physical tabletop provides public and private needs for people around the table. For competing scenarios such as playing a poker game or running a price negot...
Li-Wei Chan, Ting-Ting Hu, Jin-Yao Lin, Yi-Ping Hu...
VLSID
2008
IEEE
122views VLSI» more  VLSID 2008»
15 years 11 months ago
Implementing the Best Processor Cores
It is well-known that varying architectural, technological and implementation aspects of embedded microprocessors, such as ARM, can produce widely differing performance and power ...
Vamsi Boppana, Rahoul Varma, S. Balajee
BROADNETS
2007
IEEE
15 years 11 months ago
Resource dimensioning in WDM networks under state-based routing schemes
— Network dimensioning for wavelength-routed WDM networks has been extensively studied to maximize connection acceptance rate while minimizing the total cost. However, Internet s...
Xiaolan J. Zhang, Sun-il Kim, Steven S. Lumetta
IEEESCC
2007
IEEE
15 years 11 months ago
Web Services Security and Privacy
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
Patrick C. K. Hung, Casey K. Fung
« Prev « First page 1713 / 1917 Last » Next »