Results 1 - 10
of
5,145
Context-Sensitive Resource Discovery
- In Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
, 2003
"... This paper presents the "Solar" system framework that allows resources to advertise context-sensitive names and for applications to make context-sensitive name queries. The heart of our framework is a small specification language that allows composition of "context-processing operator ..."
Abstract
-
Cited by 35 (5 self)
- Add to MetaCart
This paper presents the "Solar" system framework that allows resources to advertise context-sensitive names and for applications to make context-sensitive name queries. The heart of our framework is a small specification language that allows composition of "
BIRCH: an efficient data clustering method for very large databases
- In Proc. of the ACM SIGMOD Intl. Conference on Management of Data (SIGMOD
, 1996
"... Finding useful patterns in large datasets has attracted considerable interest recently, and one of the most widely st,udied problems in this area is the identification of clusters, or deusel y populated regions, in a multi-dir nensional clataset. Prior work does not adequately address the problem of ..."
Abstract
-
Cited by 576 (2 self)
- Add to MetaCart
multi-dimensional metric data points to try to produce the best quality clustering with the available resources (i. e., available memory and time constraints). BIRCH can typically find a goocl clustering with a single scan of the data, and improve the quality further with a few aclditioual scans. BIRCH
Static Scheduling of Synchronous Data Flow Programs for Digital Signal Processing
- IEEE TRANSACTIONS ON COMPUTERS
, 1987
"... Large grain data flow (LGDF) programming is natural and convenient for describing digital signal processing (DSP) systems, but its runtime overhead is costly in real time or cost-sensitive applications. In some situations, designers are not willing to squander computing resources for the sake of pro ..."
Abstract
-
Cited by 598 (37 self)
- Add to MetaCart
Large grain data flow (LGDF) programming is natural and convenient for describing digital signal processing (DSP) systems, but its runtime overhead is costly in real time or cost-sensitive applications. In some situations, designers are not willing to squander computing resources for the sake
Locality-Sensitive Resource Allocation
- Weizmann Institute
, 1990
"... This paper presents a locality-sensitive controller, governing the supply of demands for a given resource in a way that takes into account the distances between the requesting vertex and the location of resource. The controller has efficient communication complexities for its allocation and update o ..."
Abstract
-
Cited by 4 (1 self)
- Add to MetaCart
This paper presents a locality-sensitive controller, governing the supply of demands for a given resource in a way that takes into account the distances between the requesting vertex and the location of resource. The controller has efficient communication complexities for its allocation and update
No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web
- In 1st European Semantic Web Symposium (ESWS 2004), volume 3053 of Lecture Notes in Computer Science
, 2004
"... Gaining access to sensitive resources on the Web usually involves an explicit registration step, where the client has to provide a predetermined set of information to the server. The registration process yields a login/password combination, a cookie, or something similar that can be used to access t ..."
Abstract
-
Cited by 85 (41 self)
- Add to MetaCart
Gaining access to sensitive resources on the Web usually involves an explicit registration step, where the client has to provide a predetermined set of information to the server. The registration process yields a login/password combination, a cookie, or something similar that can be used to access
Path-Sensitive Resource Analysis Compliant with Assertions
"... We consider the problem of precise resource analysis of loopbounded programs where assertions about resource usage may be enforced at selected program points. We first argue that to be precise, we need to unroll the loops in the manner of symbolic simulation. This suggests that the treatment of the ..."
Abstract
- Add to MetaCart
We consider the problem of precise resource analysis of loopbounded programs where assertions about resource usage may be enforced at selected program points. We first argue that to be precise, we need to unroll the loops in the manner of symbolic simulation. This suggests that the treatment
Path-Sensitive Resource Analysis Compliant with Assertions
"... Abstract. We consider the problem of bounding the worst-case resourse usage of loop-bounded programs, where assertions about valid program executions may be enforced at selected program points. It is folklore that to be precise, path-sensitivity is needed. This entails unrolling loops in the manner ..."
Abstract
- Add to MetaCart
Abstract. We consider the problem of bounding the worst-case resourse usage of loop-bounded programs, where assertions about valid program executions may be enforced at selected program points. It is folklore that to be precise, path-sensitivity is needed. This entails unrolling loops in the manner
Project Phase Activities Sensitive Resource Considerations
"... This simple guide provides insight on how Connecticut administers the Transportation Enhancement Program as a subcomponent of the Federal Highway Administration’s (FHWA) Transportation Alternatives Program (TAP). The article focuses on the program funds typically available to local project administr ..."
Abstract
- Add to MetaCart
This simple guide provides insight on how Connecticut administers the Transportation Enhancement Program as a subcomponent of the Federal Highway Administration’s (FHWA) Transportation Alternatives Program (TAP). The article focuses on the program funds typically available to local project administrators through regional planning organizations (RPOs) and sources of additional information on the program.
Delay-sensitive resource management in multi-hop cognitive radio networks
- in: Proceedings of the IEEE DySPAN
, 2008
"... Abstract–Dynamic resource management by the various cognitive nodes fundamentally changes the passive way that wireless nodes are currently adapting their transmission strategies to match available wireless resources, by enabling them to consciously influence the wireless system dynamics based on th ..."
Abstract
-
Cited by 22 (0 self)
- Add to MetaCart
Abstract–Dynamic resource management by the various cognitive nodes fundamentally changes the passive way that wireless nodes are currently adapting their transmission strategies to match available wireless resources, by enabling them to consciously influence the wireless system dynamics based
Automatic mediation of privacy-sensitive resource access in smartphone applications.
- In USENIX Security,
, 2013
"... Abstract Mobile app development best practices suggest that developers obtain opt-in consent from users prior to accessing potentially sensitive information on the phone. We study challenges that mobile application developers have with meeting such requirements, and highlight the promise of using n ..."
Abstract
-
Cited by 10 (1 self)
- Add to MetaCart
Abstract Mobile app development best practices suggest that developers obtain opt-in consent from users prior to accessing potentially sensitive information on the phone. We study challenges that mobile application developers have with meeting such requirements, and highlight the promise of using
Results 1 - 10
of
5,145