This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
In this paper, we describe our recent experiences in adding a number of object-relational extensions to the DB2 Universal Database UDB system as part of a research and developme...
Michael J. Carey, Donald D. Chamberlin, Srinivasa ...
People with severe speech and motor impairments SSMI can often use augmentative communication devices to help them communicate. While these devices can provide speech synthesis or ...
Abstract: We propose an e cient method that determines the sign of a multivariate polynomial expression with integer coe cients. This is a central operation on which the robustness...
We present a new representation for time-varying image data that allows for varying--and arbitrarily high--spatial and temporal resolutions in different parts of a video sequence....
Adam Finkelstein, Charles E. Jacobs, David Salesin