Sciweavers

10797 search results - page 2086 / 2160
» Robust control applications
Sort
View
80
Voted
ACSAC
2005
IEEE
15 years 4 months ago
Intrusion Detection in RBAC-administered Databases
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance security and privacy. An important componen...
Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athen...
CLUSTER
2005
IEEE
15 years 4 months ago
Memory Management Support for Multi-Programmed Remote Direct Memory Access (RDMA) Systems
Current operating systems offer basic support for network interface controllers (NICs) supporting remote direct memory access (RDMA). Such support typically consists of a device d...
Kostas Magoutis
ICDAR
2005
IEEE
15 years 4 months ago
Improved Text-Detection Methods for a Camera-based Text Reading System for Blind Persons
Automatic text recognition from natural images receives a growing attention because of potential applications in image retrieval, robotics and intelligent transport system. Camera...
Nobuo Ezaki, Kimiyasu Kiyota, Bui Truong Minh, Mar...
ICRA
2005
IEEE
130views Robotics» more  ICRA 2005»
15 years 4 months ago
Effective Constrained Dynamic Simulation Using Implicit Constraint Enforcement
- Stable and effective enforcement of hard constraints is one of the crucial components in controlling physics-based dynamic simulation systems. The conventional explicit Baumgarte...
Min Hong, Min-Hyung Choi, Sunhwa Jung, Samuel W. J...
INFOCOM
2005
IEEE
15 years 4 months ago
Dependency isolation for thread-based multi-tier Internet services
— Multi-tier Internet service clusters often contain complex calling dependencies among service components spreading across cluster nodes. Without proper handling, partial failur...
Lingkun Chu, Kai Shen, Hong Tang, Tao Yang, Jingyu...
« Prev « First page 2086 / 2160 Last » Next »