Sciweavers

2074 search results - page 155 / 415
» Using an Object Reference Approach to Distributed Updates
Sort
View
124
Voted
DEXA
2007
Springer
173views Database» more  DEXA 2007»
15 years 10 months ago
A P2P Technique for Continuous k-Nearest-Neighbor Query in Road Networks
Due to the high frequency in location updates and the expensive cost of continuous query processing, server computation capacity and wireless communication bandwidth are the two li...
Fuyu Liu, Kien A. Hua, Tai T. Do
128
Voted
CLUSTER
2008
IEEE
15 years 3 months ago
Translating Service Level Objectives to lower level policies for multi-tier services
Service providers and their customers agree on certain quality of service guarantees through Service Level Agreements (SLA). An SLA contains one or more Service Level Objectives (S...
Yuan Chen, Subu Iyer, Xue Liu, Dejan S. Milojicic,...
151
Voted
JMM2
2006
141views more  JMM2 2006»
15 years 3 months ago
Human Tracking by Fast Mean Shift Mode Seeking
Change detection by background subtraction is a common approach to detect moving foreground. The resulting difference image is usually thresholded to obtain objects based on pixel ...
Csaba Beleznai, Bernhard Frühstück, Hors...
139
Voted
ICSE
2005
IEEE-ACM
16 years 3 months ago
Automatic generation and maintenance of correct spreadsheets
Existing spreadsheet systems allow users to change cells arbitrarily, which is a major source of spreadsheet errors. We propose a system that prevents errors in spreadsheets by re...
Martin Erwig, Robin Abraham, Irene Cooperstein, St...
101
Voted
ICDCSW
2007
IEEE
15 years 10 months ago
Exploring Symmetric Cryptography for Secure Network Reprogramming
Recent secure code-update protocols for sensor networks have been based on asymmetric-crypto primitives such as digital signatures. Our approach, Castor, explores the feasibility ...
Donnie H. Kim, Rajeev Gandhi, Priya Narasimhan