Sciweavers

800 search results - page 71 / 160
» XML access control using static analysis
Sort
View
214
Voted
POPL
2006
ACM
16 years 3 months ago
A virtual class calculus
Virtual classes are class-valued attributes of objects. Like virtual methods, virtual classes are defined in an object's class and may be redefined within subclasses. They re...
Erik Ernst, Klaus Ostermann, William R. Cook
148
Voted
INFOCOM
2010
IEEE
15 years 1 months ago
Distributed Coordination with Deaf Neighbors: Efficient Medium Access for 60 GHz Mesh Networks
Multi-gigabit outdoor mesh networks operating in the unlicensed 60 GHz "millimeter (mm) wave" band, offer the possibility of a quickly deployable broadband extension of t...
Sumit Singh, Raghuraman Mudumbai, Upamanyu Madhow
MICRO
2003
IEEE
106views Hardware» more  MICRO 2003»
15 years 8 months ago
Near-Optimal Precharging in High-Performance Nanoscale CMOS Caches
High-performance caches statically pull up the bitlines in all cache subarrays to optimize cache access latency. Unfortunately, such an architecture results in a significant wast...
Se-Hyun Yang, Babak Falsafi
136
Voted
WCE
2007
15 years 4 months ago
Face Recognition using Discrete Cosine Transform plus Linear Discriminant Analysis
—Face recognition is a biometric identification method which among the other methods such as, finger print identification, speech recognition, signature and hand written recognit...
M. Hajiarbabi, J. Askari, S. Sadri, M. Saraee
INFOCOM
2008
IEEE
15 years 10 months ago
How Many Packets Can We Encode? - An Analysis of Practical Wireless Network Coding
— While the practical coding scheme [1] has been shown to be able to improve throughput of wireless networks, there still lacks fundamental understanding on how the coding scheme...
Jilin Le, John C. S. Lui, Dah-Ming Chiu