Sciweavers

5608 search results - page 917 / 1122
» On the Theory of Matchgate Computations
Sort
View
95
Voted
IMC
2004
ACM
15 years 7 months ago
Identifying elephant flows through periodically sampled packets
Identifying elephant flows is very important in developing effective and efficient traffic engineering schemes. In addition, obtaining the statistics of these flows is also ver...
Tatsuya Mori, Masato Uchida, Ryoichi Kawahara, Jia...
IUI
2004
ACM
15 years 7 months ago
SUPPLE: automatically generating user interfaces
In order to give people ubiquitous access to software applications, device controllers, and Internet services, it will be necessary to automatically adapt user interfaces to the c...
Krzysztof Gajos, Daniel S. Weld
MM
2004
ACM
118views Multimedia» more  MM 2004»
15 years 7 months ago
Scene tunnels for seamless virtual tour
This paper proposes a visual representation named scene tunnel to archive and visualize urban scenes for Internet based virtual tour. We scan cityscapes using multiple cameras on ...
Jiang Yu Zheng, Yu Zhou
SACMAT
2004
ACM
15 years 7 months ago
X-GTRBAC admin: a decentralized administration model for enterprise wide access control
Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large ...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...
SIGECOM
2004
ACM
93views ECommerce» more  SIGECOM 2004»
15 years 7 months ago
Strategic deliberation and truthful revelation: an impossibility result
In many market settings, agents do not know their preferences a priori. Instead, they may have to solve computationally complex optimization problems, query databases, or perform ...
Kate Larson, Tuomas Sandholm