Sciweavers

4445 search results - page 866 / 889
» Reflective Authorization Systems
Sort
View
VLDB
1987
ACM
78views Database» more  VLDB 1987»
15 years 1 months ago
Measured Performance of Time Interval Concurrency Control Techniques
This paper reports on an implementation of Bayer's Time Interval concurrency control method and compares it to the performance of a conventional timestamp method. The impleme...
Jerre D. Noe, David B. Wagner
DRR
2010
15 years 3 days ago
Biomedical article retrieval using multimodal features and image annotations in region-based CBIR
Biomedical images are invaluable in establishing diagnosis, acquiring technical skills, and implementing best practices in many areas of medicine. At present, images needed for in...
Daekeun You, Sameer Antani, Dina Demner-Fushman, M...
MOBISYS
2010
ACM
15 years 13 hour ago
NAPman: network-assisted power management for wifi devices
WiFi radios in smart-phones consume a significant amount of power when active. The 802.11 standard allows these devices to save power through an energy-conserving Power Save Mode ...
Eric Rozner, Vishnu Navda, Ramachandran Ramjee, Sh...
98
Voted
MOBISYS
2010
ACM
15 years 13 hour ago
PRISM: platform for remote sensing using smartphones
To realize the potential of opportunistic and participatory sensing using mobile smartphones, a key challenge is ensuring the ease of developing and deploying such applications, w...
Tathagata Das, Prashanth Mohan, Venkata N. Padmana...
AIRWEB
2008
Springer
14 years 11 months ago
Robust PageRank and locally computable spam detection features
Since the link structure of the web is an important element in ranking systems on search engines, web spammers widely use the link structure of the web to increase the rank of the...
Reid Andersen, Christian Borgs, Jennifer T. Chayes...