• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 5,145
Next 10 →

Context-Sensitive Resource Discovery

by Guanling Chen, David Kotz - In Proceedings of the First IEEE International Conference on Pervasive Computing and Communications , 2003
"... This paper presents the "Solar" system framework that allows resources to advertise context-sensitive names and for applications to make context-sensitive name queries. The heart of our framework is a small specification language that allows composition of "context-processing operator ..."
Abstract - Cited by 35 (5 self) - Add to MetaCart
This paper presents the "Solar" system framework that allows resources to advertise context-sensitive names and for applications to make context-sensitive name queries. The heart of our framework is a small specification language that allows composition of "

BIRCH: an efficient data clustering method for very large databases

by Tian Zhang, Raghu Ramakrishnan, Miron Livny - In Proc. of the ACM SIGMOD Intl. Conference on Management of Data (SIGMOD , 1996
"... Finding useful patterns in large datasets has attracted considerable interest recently, and one of the most widely st,udied problems in this area is the identification of clusters, or deusel y populated regions, in a multi-dir nensional clataset. Prior work does not adequately address the problem of ..."
Abstract - Cited by 576 (2 self) - Add to MetaCart
multi-dimensional metric data points to try to produce the best quality clustering with the available resources (i. e., available memory and time constraints). BIRCH can typically find a goocl clustering with a single scan of the data, and improve the quality further with a few aclditioual scans. BIRCH

Static Scheduling of Synchronous Data Flow Programs for Digital Signal Processing

by Edward Ashford Lee, David G. Messerschmitt - IEEE TRANSACTIONS ON COMPUTERS , 1987
"... Large grain data flow (LGDF) programming is natural and convenient for describing digital signal processing (DSP) systems, but its runtime overhead is costly in real time or cost-sensitive applications. In some situations, designers are not willing to squander computing resources for the sake of pro ..."
Abstract - Cited by 598 (37 self) - Add to MetaCart
Large grain data flow (LGDF) programming is natural and convenient for describing digital signal processing (DSP) systems, but its runtime overhead is costly in real time or cost-sensitive applications. In some situations, designers are not willing to squander computing resources for the sake

Locality-Sensitive Resource Allocation

by Baruch Awerbuch, David Peleg - Weizmann Institute , 1990
"... This paper presents a locality-sensitive controller, governing the supply of demands for a given resource in a way that takes into account the distances between the requesting vertex and the location of resource. The controller has efficient communication complexities for its allocation and update o ..."
Abstract - Cited by 4 (1 self) - Add to MetaCart
This paper presents a locality-sensitive controller, governing the supply of demands for a given resource in a way that takes into account the distances between the requesting vertex and the location of resource. The controller has efficient communication complexities for its allocation and update

No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web

by Rita Gavriloaie, Wolfgang Nejdl, Daniel Olmedilla, Kent E. Seamons, Marianne Winslett - In 1st European Semantic Web Symposium (ESWS 2004), volume 3053 of Lecture Notes in Computer Science , 2004
"... Gaining access to sensitive resources on the Web usually involves an explicit registration step, where the client has to provide a predetermined set of information to the server. The registration process yields a login/password combination, a cookie, or something similar that can be used to access t ..."
Abstract - Cited by 85 (41 self) - Add to MetaCart
Gaining access to sensitive resources on the Web usually involves an explicit registration step, where the client has to provide a predetermined set of information to the server. The registration process yields a login/password combination, a cookie, or something similar that can be used to access

Path-Sensitive Resource Analysis Compliant with Assertions

by unknown authors
"... We consider the problem of precise resource analysis of loopbounded programs where assertions about resource usage may be enforced at selected program points. We first argue that to be precise, we need to unroll the loops in the manner of symbolic simulation. This suggests that the treatment of the ..."
Abstract - Add to MetaCart
We consider the problem of precise resource analysis of loopbounded programs where assertions about resource usage may be enforced at selected program points. We first argue that to be precise, we need to unroll the loops in the manner of symbolic simulation. This suggests that the treatment

Path-Sensitive Resource Analysis Compliant with Assertions

by Duc-hiep Chu, Joxan Jaffar
"... Abstract. We consider the problem of bounding the worst-case resourse usage of loop-bounded programs, where assertions about valid program executions may be enforced at selected program points. It is folklore that to be precise, path-sensitivity is needed. This entails unrolling loops in the manner ..."
Abstract - Add to MetaCart
Abstract. We consider the problem of bounding the worst-case resourse usage of loop-bounded programs, where assertions about valid program executions may be enforced at selected program points. It is folklore that to be precise, path-sensitivity is needed. This entails unrolling loops in the manner

Project Phase Activities Sensitive Resource Considerations

by unknown authors
"... This simple guide provides insight on how Connecticut administers the Transportation Enhancement Program as a subcomponent of the Federal Highway Administration’s (FHWA) Transportation Alternatives Program (TAP). The article focuses on the program funds typically available to local project administr ..."
Abstract - Add to MetaCart
This simple guide provides insight on how Connecticut administers the Transportation Enhancement Program as a subcomponent of the Federal Highway Administration’s (FHWA) Transportation Alternatives Program (TAP). The article focuses on the program funds typically available to local project administrators through regional planning organizations (RPOs) and sources of additional information on the program.

Delay-sensitive resource management in multi-hop cognitive radio networks

by Hsien-po Shiang, Mihaela Van Der Schaar - in: Proceedings of the IEEE DySPAN , 2008
"... Abstract–Dynamic resource management by the various cognitive nodes fundamentally changes the passive way that wireless nodes are currently adapting their transmission strategies to match available wireless resources, by enabling them to consciously influence the wireless system dynamics based on th ..."
Abstract - Cited by 22 (0 self) - Add to MetaCart
Abstract–Dynamic resource management by the various cognitive nodes fundamentally changes the passive way that wireless nodes are currently adapting their transmission strategies to match available wireless resources, by enabling them to consciously influence the wireless system dynamics based

Automatic mediation of privacy-sensitive resource access in smartphone applications.

by Benjamin Livshits , Jaeyeon Jung - In USENIX Security, , 2013
"... Abstract Mobile app development best practices suggest that developers obtain opt-in consent from users prior to accessing potentially sensitive information on the phone. We study challenges that mobile application developers have with meeting such requirements, and highlight the promise of using n ..."
Abstract - Cited by 10 (1 self) - Add to MetaCart
Abstract Mobile app development best practices suggest that developers obtain opt-in consent from users prior to accessing potentially sensitive information on the phone. We study challenges that mobile application developers have with meeting such requirements, and highlight the promise of using
Next 10 →
Results 1 - 10 of 5,145
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University