Sciweavers

1517 search results - page 246 / 304
» Time and Location Based Services with Access Control
Sort
View
IPPS
2009
IEEE
15 years 4 months ago
Performance prediction for running workflows under role-based authorization mechanisms
When investigating the performance of running scientific/ commercial workflows in parallel and distributed systems, we often take into account only the resources allocated to the ...
Ligang He, Mark Calleja, Mark Hayes, Stephen A. Ja...
ICDE
2010
IEEE
562views Database» more  ICDE 2010»
15 years 9 months ago
Multi-Guarded Safe Zone: An Effective Technique to Monitor Moving Circular Range Queries
Given a positive value r, a circular range query returns the objects that lie within the distance r of the query location. In this paper, we study the circular range queries that c...
Muhammad Aamir Cheema, Ljiljana Brankovic, Xuemin ...
LICS
2005
IEEE
15 years 3 months ago
Generalizing Parametricity Using Information-flow
Run-time type analysis allows programmers to easily and concisely define operations based upon type structure, such as serialization, iterators, and structural equality. However,...
Geoffrey Washburn, Stephanie Weirich
ICARCV
2002
IEEE
185views Robotics» more  ICARCV 2002»
15 years 2 months ago
Evolving cooperative robotic behaviour using distributed genetic programming
Cooperative robotic systems provide design and implementation challenges that are not easy to solve. This paper describes a parallel implementation for evolving cooperative roboti...
Chris H. Messom, Matthew G. Walker
JSAC
2011
219views more  JSAC 2011»
14 years 4 months ago
Detection of Small-Scale Primary Users in Cognitive Radio Networks
Abstract—In cognitive radio networks (CRNs), detecting smallscale primary devices, such as wireless microphones, is a challenging, but very important, problem that has not yet be...
Alexander W. Min, Xinyu Zhang, Kang G. Shin