Sciweavers

96 search results - page 19 / 20
» On resolving Conflicts between Arguments
Sort
View
SSD
2009
Springer
145views Database» more  SSD 2009»
14 years 24 days ago
Versioning of Network Models in a Multiuser Environment
The standard database mechanisms for concurrency control, which include transactions and locking protocols, do not provide the support needed for updating complex geographic data i...
Petko Bakalov, Erik G. Hoel, Sudhakar Menon, Vassi...
PERCOM
2007
ACM
14 years 5 months ago
Automatic Generation of Device User-Interfaces?
One of the visions of pervasive computing is using mobile computers to interact with networked devices. A question raised by this vision is: Should the userinterfaces of these dev...
Olufisayo Omojokun, Prasun Dewan
CHI
2003
ACM
14 years 6 months ago
Where on-line meets on the streets: experiences with mobile mixed reality games
We describe two games in which online participants collaborated with mobile participants on the city streets. In the first, the players were online and professional performers wer...
Martin Flintham, Steve Benford, Rob Anastasi, Terr...
ICDCS
1999
IEEE
13 years 10 months ago
Incorporating Transaction Semantics to Reduce Reprocessing Overhead in Replicated Mobile Data Applications
Update anywhere-anytime-anyway transactional replication has unstable behavior as the workload scales up. To reduce this problem, a two-tier replication algorithm is proposed in [...
Peng Liu, Paul Ammann, Sushil Jajodia
ACSAC
1998
IEEE
13 years 10 months ago
Application-Level Isolation to Cope with Malicious Database Users
System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore us...
Sushil Jajodia, Peng Liu, Catherine D. McCollum