Results 1 - 10
of
3,087
Cyberguide: A Mobile Context-Aware Tour Guide
, 1996
"... Future computing environments will free the user from the constraints of the desktop. Applications for a mobile environment should take advantage of contextual information, suach as position, to offer greater services to the user. In his paper, we present the Cyberguide project, in which we are buil ..."
Abstract
-
Cited by 652 (24 self)
- Add to MetaCart
Future computing environments will free the user from the constraints of the desktop. Applications for a mobile environment should take advantage of contextual information, suach as position, to offer greater services to the user. In his paper, we present the Cyberguide project, in which we
Tinysec: A link layer security architecture for wireless sensor networks
- in Proc of the 2nd Int’l Conf on Embedded Networked Sensor Systems
"... We introduce TinySec, the first fully-implemented link layer security architecture for wireless sensor networks. In our design, we leverage recent lessons learned from design vulnerabilities in security protocols for other wireless networks such as 802.11b and GSM. Conventional security protocols te ..."
Abstract
-
Cited by 521 (0 self)
- Add to MetaCart
tend to be conservative in their security guarantees, typically adding 16–32 bytes of overhead. With small memories, weak processors, limited energy, and 30 byte packets, sensor networks cannot afford this luxury. TinySec addresses these extreme resource constraints with careful design; we explore
QoS-aware middleware for web services composition
- IEEE TRANS. SOFTWARE ENG
, 2004
"... The paradigmatic shift from a Web of manual interactions to a Web of programmatic interactions driven by Web services is creating unprecedented opportunities for the formation of online Business-to-Business (B2B) collaborations. In particular, the creation of value-added services by composition of ..."
Abstract
-
Cited by 486 (6 self)
- Add to MetaCart
middleware platform which addresses the issue of selecting Web services for the purpose of their composition in a way that maximizes user satisfaction expressed as utility functions over QoS attributes, while satisfying the constraints set by the user and by the structure of the composite service. Two
System Description: Twelf --- A Meta-Logical Framework for Deductive Systems
- Proceedings of the 16th International Conference on Automated Deduction (CADE-16
, 1999
"... . Twelf is a meta-logical framework for the specification, implementation, and meta-theory of deductive systems from the theory of programming languages and logics. It relies on the LF type theory and the judgments-as-types methodology for specification [HHP93], a constraint logic programming interp ..."
Abstract
-
Cited by 357 (54 self)
- Add to MetaCart
. Twelf is a meta-logical framework for the specification, implementation, and meta-theory of deductive systems from the theory of programming languages and logics. It relies on the LF type theory and the judgments-as-types methodology for specification [HHP93], a constraint logic programming
Giotto: A time-triggered language for embedded programming
- PROCEEDINGS OF THE IEEE
, 2001
"... Giotto provides an abstract programmer's model for the implementation of embedded control systems with hard real-time constraints. A typical control application consists of periodic software tasks together with a mode switching logic for enabling and disabling tasks. Giotto speci es timetrigger ..."
Abstract
-
Cited by 286 (37 self)
- Add to MetaCart
timetriggered sensor readings, task invocations, and mode switches independent of any implementation platform. Giotto can be annotated with platform constraints such as task-to-host mappings, and task and communication schedules. The annotations are directives for the Giotto compiler, but they do not alter
Fluid flow through carbonate platforms: constraints from 234U = 238U and Cl in Bahamas pore-waters
, 1998
"... The geometry, timing, and rate of fluid-flow through carbonate margins and platforms is not well constrained. In this study, we use U concentrations and isotope ratios measured on small volumes of pore-water from Bahamas slope sediment, coupled with existing chlorinity data, to place constraints on ..."
Abstract
- Add to MetaCart
The geometry, timing, and rate of fluid-flow through carbonate margins and platforms is not well constrained. In this study, we use U concentrations and isotope ratios measured on small volumes of pore-water from Bahamas slope sediment, coupled with existing chlorinity data, to place constraints
The Design and Implementation of an Operating System to Support Distributed Multimedia Applications
, 1996
"... Support for multimedia applications by general purpose computing platforms has been the subject of considerable research. Much of this work is based on an evolutionary strategy in which small changes to existing systems are made. The approach adopted here is to start ab initio with no backward compa ..."
Abstract
-
Cited by 291 (22 self)
- Add to MetaCart
Support for multimedia applications by general purpose computing platforms has been the subject of considerable research. Much of this work is based on an evolutionary strategy in which small changes to existing systems are made. The approach adopted here is to start ab initio with no backward
ECLiPSe: A Platform for Constraint Logic Programming
, 1997
"... This paper introduces the Constraint Logic Programming (CLP) platform ECLiPSe. ECLiPSe is designed to be more than an implementation of CLP: it also supports mathematical programming and stochastic programming techniques. The crucial advantage of ECLiPSe is that it enables the programmer to use a co ..."
Abstract
-
Cited by 120 (1 self)
- Add to MetaCart
This paper introduces the Constraint Logic Programming (CLP) platform ECLiPSe. ECLiPSe is designed to be more than an implementation of CLP: it also supports mathematical programming and stochastic programming techniques. The crucial advantage of ECLiPSe is that it enables the programmer to use a
Graph embedding and extension: A general framework for dimensionality reduction
- IEEE TRANS. PATTERN ANAL. MACH. INTELL
, 2007
"... Over the past few decades, a large family of algorithms—supervised or unsupervised; stemming from statistics or geometry theory—has been designed to provide different solutions to the problem of dimensionality reduction. Despite the different motivations of these algorithms, we present in this paper ..."
Abstract
-
Cited by 271 (29 self)
- Add to MetaCart
properties of a data set, with constraints from scale normalization or a penalty graph that characterizes a statistical or geometric property that should be avoided. Furthermore, the graph embedding framework can be used as a general platform for developing new dimensionality reduction algorithms
Platform
, 1994
"... The NAS Parallel Benchmark Kernels in MPL 14of introduced overhead by Mentat as compared to the lower level, hand-coded version of the application, as well as better communications performance 3.4 CG Kernel Performance As in the MG kernel case, our CG implementation was quite similar to the provided ..."
Abstract
- Add to MetaCart
to the provided NAS version in its exploitation of opportunities for parallel execution. Unfortunately, we observed memory constraints which prevented running the full sized tests, making performance comparison difficult. Given the observed results, however, it seems likely that our performance would compare
Results 1 - 10
of
3,087