Sciweavers

193 search results - page 23 / 39
» Physical Access Control for Captured RFID Data
Sort
View
PERCOM
2006
ACM
16 years 1 days ago
Context and Location-Aware Encryption for Pervasive Computing Environments
Pervasive computing promises to revolutionize computing, empower mobile users, and enhance mobility, customizability and adaptability of computing environments. Intrinsic to the n...
Jalal Al-Muhtadi, Raquel L. Hill, Roy H. Campbell,...
80
Voted
IHM
2003
ACM
15 years 5 months ago
The missing link: integrating paper and electronic documents
Despite the ubiquity of computers and on-line documents, paper persists. As physical objects, paper documents are easy to use, flexible, portable and are difficult to replace. Eve...
Wendy E. Mackay
SIGMOD
2009
ACM
201views Database» more  SIGMOD 2009»
16 years 20 days ago
Cost based plan selection for xpath
We present a complete XPath cost-based optimization and execution framework and demonstrate its effectiveness and efficiency for a variety of queries and datasets. The framework i...
Haris Georgiadis, Minas Charalambides, Vasilis Vas...
103
Voted
VEE
2010
ACM
291views Virtualization» more  VEE 2010»
15 years 7 months ago
Neon: system support for derived data management
Modern organizations face increasingly complex information management requirements. A combination of commercial needs, legal liability and regulatory imperatives has created a pat...
Qing Zhang, John McCullough, Justin Ma, Nabil Sche...
110
Voted
IJCAI
2007
15 years 1 months ago
Learning to Walk through Imitation
Programming a humanoid robot to walk is a challenging problem in robotics. Traditional approaches rely heavily on prior knowledge of the robot's physical parameters to devise...
Rawichote Chalodhorn, David B. Grimes, Keith Groch...