Sciweavers

2669 search results - page 527 / 534
» Providing Contextual Information to Pervasive Computing Appl...
Sort
View
99
Voted
AIPR
2000
IEEE
15 years 1 months ago
Moving Object Tracking in Video
The advance of technology makes video acquisition devices better and less costly, thereby increasing the number of applications that can effectively utilize digital video. Compare...
Yiwei Wang, John F. Doherty, Robert E. Van Dyck
104
Voted
SIGCOMM
1999
ACM
15 years 1 months ago
Load-Sensitive Routing of Long-Lived IP Flows
Internet service providers face a daunting challenge in provisioning network resources, due to the rapid growth of the Internet and wide fluctuations in the underlying traffic pa...
Anees Shaikh, Jennifer Rexford, Kang G. Shin
82
Voted
PLDI
1998
ACM
15 years 1 months ago
Run-time Code Generation and Modal-ML
This paper presents a typed programming language and compiler for run-time code generation. The language, called ML2, extends ML with modal operators in the style of the Mini-ML2 ...
Philip Wickline, Peter Lee, Frank Pfenning
CICLING
2010
Springer
15 years 1 months ago
Word Length n-Grams for Text Re-use Detection
Abstract. The automatic detection of shared content in written documents –which includes text reuse and its unacknowledged commitment, plagiarism– has become an important probl...
Alberto Barrón-Cedeño, Chiara Basile...
CCS
2006
ACM
15 years 1 months ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...