Sciweavers

789 search results - page 58 / 158
» Pushing using Compliance
Sort
View
CN
2007
123views more  CN 2007»
15 years 1 months ago
Information retrieval in schema-based P2P systems using one-dimensional semantic space
The widespread use of RDF-based information necessitates efficient information retrieval techniques in wide-area networks. In this paper, we present Dynamic Semantic Space, a sche...
Tao Gu, Hung Keng Pung, Daqing Zhang
BMVC
2010
14 years 11 months ago
Robust Camera Calibration using Inaccurate Targets
Accurate intrinsic camera calibration is essential to any computer vision task that involves image based measurements. Given its crucial role with respect to precision, a large nu...
Andrea Albarelli, Emanuele Rodolà, Andrea T...
SIGMOD
2012
ACM
345views Database» more  SIGMOD 2012»
13 years 3 months ago
Shark: fast data analysis using coarse-grained distributed memory
Shark is a research data analysis system built on a novel rained distributed shared-memory abstraction. Shark marries query processing with deep data analysis, providing a unifie...
Cliff Engle, Antonio Lupher, Reynold Xin, Matei Za...
HICSS
2010
IEEE
155views Biometrics» more  HICSS 2010»
15 years 8 months ago
Experiences Validating the Access Policy Tool in Industrial Settings
—The Access Policy Tool (APT) analyzes the firewall configuration in an enterprise network for compliance with global access policy, e.g., such as describes the industry’s be...
David M. Nicol, William H. Sanders, Mouna Seri, Sa...
SOCO
2009
Springer
15 years 8 months ago
Composing RESTful Services with JOpera
The REST architectural style is emerging as an alternative technology platform for the realization of service-oriented architectures. In this paper, we apply the notion of composit...
Cesare Pautasso