Sciweavers

658 search results - page 60 / 66
» Time Management in the DoD High Level Architecture
Sort
View
107 views 104 votes 15 years 5 months ago  CC 1999»
Abstract. Optimizing compilers typically limit the scope of their analyses and optimizations to individual modules. This has two drawbacks: rst, library code cannot be optimized to...
102 views 102 votes 15 years 5 months ago  ISSS 1996»
Traditionally, application specific computations have been focusing on numerically intensive data manipulation. Modern communications and DSP applications, such as WWW, interactiv...
113 views 116 votes 15 years 3 months ago  CCS 2008»
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
180 views 210 votes 16 years 2 months ago  ICDE 2005»
Online monitoring of data streams poses a challenge in many data-centric applications, such as telecommunications networks, traffic management, trend-related analysis, webclick st...
165 views 133 votes 15 years 1 months ago  VLDB 2002»
RTMonitor is a real-time data management system for traffic navigation applications. In our system, mobile vehicles initiate time-constrained navigation requests and RTMonitor cal...
197 views 129 votes 15 years 7 months ago  ISORC 2005»
As complexity of real-time embedded software grows, it is desirable to use formal verification techniques to achieve a high level of assurance. We discuss application of model-ch...
132 views 96 votes 15 years 1 months ago  JUCS 2002»
: Community web sites exhibit the property that multiple content providers exist. Of course, any portal is only as useful as the quality and amount of its content. Developing origi...
175 views 127 votes 15 years 1 months ago  VR 2008»
We present a new technique for managing visual clutter caused by overlapping labels in complex information displays. This technique, "label layering", utilizes stereosco...
89 views 106 votes 15 years 1 months ago  CERA 2004»
: A secure electronic cash scheme and its role-based access control (RBAC) management are proposed in this paper. The scheme uses electronic cash for payment transactions. In this ...
138 views 114 votes 15 years 6 months ago  SEKE 2005»
Design combinatorial theory for test-case generation has been used successfully in the past. It is useful in optimizing test cases as it is practically impossible to exhaustively t...