• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,087
Next 10 →

Cyberguide: A Mobile Context-Aware Tour Guide

by Gregory D. Abowd, Christopher G. Atkeson, Jason Hong, Sue Long, Rob Kooper, Mike Pinkerton , 1996
"... Future computing environments will free the user from the constraints of the desktop. Applications for a mobile environment should take advantage of contextual information, suach as position, to offer greater services to the user. In his paper, we present the Cyberguide project, in which we are buil ..."
Abstract - Cited by 652 (24 self) - Add to MetaCart
Future computing environments will free the user from the constraints of the desktop. Applications for a mobile environment should take advantage of contextual information, suach as position, to offer greater services to the user. In his paper, we present the Cyberguide project, in which we

Tinysec: A link layer security architecture for wireless sensor networks

by Chris Karlof, Naveen Sastry, David Wagner - in Proc of the 2nd Int’l Conf on Embedded Networked Sensor Systems
"... We introduce TinySec, the first fully-implemented link layer security architecture for wireless sensor networks. In our design, we leverage recent lessons learned from design vulnerabilities in security protocols for other wireless networks such as 802.11b and GSM. Conventional security protocols te ..."
Abstract - Cited by 521 (0 self) - Add to MetaCart
tend to be conservative in their security guarantees, typically adding 16–32 bytes of overhead. With small memories, weak processors, limited energy, and 30 byte packets, sensor networks cannot afford this luxury. TinySec addresses these extreme resource constraints with careful design; we explore

QoS-aware middleware for web services composition

by Liangzhao Zeng, Boualem Benatallah, Anne H. H. Ngu, Marlon Dumas, Jayant Kalagnanam, Henry Chang - IEEE TRANS. SOFTWARE ENG , 2004
"... The paradigmatic shift from a Web of manual interactions to a Web of programmatic interactions driven by Web services is creating unprecedented opportunities for the formation of online Business-to-Business (B2B) collaborations. In particular, the creation of value-added services by composition of ..."
Abstract - Cited by 486 (6 self) - Add to MetaCart
middleware platform which addresses the issue of selecting Web services for the purpose of their composition in a way that maximizes user satisfaction expressed as utility functions over QoS attributes, while satisfying the constraints set by the user and by the structure of the composite service. Two

System Description: Twelf --- A Meta-Logical Framework for Deductive Systems

by Frank Pfenning, Carsten Schurmann - Proceedings of the 16th International Conference on Automated Deduction (CADE-16 , 1999
"... . Twelf is a meta-logical framework for the specification, implementation, and meta-theory of deductive systems from the theory of programming languages and logics. It relies on the LF type theory and the judgments-as-types methodology for specification [HHP93], a constraint logic programming interp ..."
Abstract - Cited by 357 (54 self) - Add to MetaCart
. Twelf is a meta-logical framework for the specification, implementation, and meta-theory of deductive systems from the theory of programming languages and logics. It relies on the LF type theory and the judgments-as-types methodology for specification [HHP93], a constraint logic programming

Giotto: A time-triggered language for embedded programming

by Thomas A. Henzinger, Benjamin Horowitz, Christoph Meyer Kirsch - PROCEEDINGS OF THE IEEE , 2001
"... Giotto provides an abstract programmer's model for the implementation of embedded control systems with hard real-time constraints. A typical control application consists of periodic software tasks together with a mode switching logic for enabling and disabling tasks. Giotto speci es timetrigger ..."
Abstract - Cited by 286 (37 self) - Add to MetaCart
timetriggered sensor readings, task invocations, and mode switches independent of any implementation platform. Giotto can be annotated with platform constraints such as task-to-host mappings, and task and communication schedules. The annotations are directives for the Giotto compiler, but they do not alter

Fluid flow through carbonate platforms: constraints from 234U = 238U and Cl in Bahamas pore-waters

by Gideon M. Henderson A, Niall C. Slowey B, Geoff A. Haddad C , 1998
"... The geometry, timing, and rate of fluid-flow through carbonate margins and platforms is not well constrained. In this study, we use U concentrations and isotope ratios measured on small volumes of pore-water from Bahamas slope sediment, coupled with existing chlorinity data, to place constraints on ..."
Abstract - Add to MetaCart
The geometry, timing, and rate of fluid-flow through carbonate margins and platforms is not well constrained. In this study, we use U concentrations and isotope ratios measured on small volumes of pore-water from Bahamas slope sediment, coupled with existing chlorinity data, to place constraints

The Design and Implementation of an Operating System to Support Distributed Multimedia Applications

by Ian Leslie, Derek Mcauley, Richard Black, Timothy Roscoe, Paul Barham, David Evers, Robin Fairbairns, Eoin Hyden , 1996
"... Support for multimedia applications by general purpose computing platforms has been the subject of considerable research. Much of this work is based on an evolutionary strategy in which small changes to existing systems are made. The approach adopted here is to start ab initio with no backward compa ..."
Abstract - Cited by 291 (22 self) - Add to MetaCart
Support for multimedia applications by general purpose computing platforms has been the subject of considerable research. Much of this work is based on an evolutionary strategy in which small changes to existing systems are made. The approach adopted here is to start ab initio with no backward

ECLiPSe: A Platform for Constraint Logic Programming

by Mark Wallace, Stefano Novello, Joachim Schimpf , 1997
"... This paper introduces the Constraint Logic Programming (CLP) platform ECLiPSe. ECLiPSe is designed to be more than an implementation of CLP: it also supports mathematical programming and stochastic programming techniques. The crucial advantage of ECLiPSe is that it enables the programmer to use a co ..."
Abstract - Cited by 120 (1 self) - Add to MetaCart
This paper introduces the Constraint Logic Programming (CLP) platform ECLiPSe. ECLiPSe is designed to be more than an implementation of CLP: it also supports mathematical programming and stochastic programming techniques. The crucial advantage of ECLiPSe is that it enables the programmer to use a

Graph embedding and extension: A general framework for dimensionality reduction

by Shuicheng Yan, Dong Xu, Benyu Zhang, Hong-jiang Zhang, Qiang Yang, Stephen Lin - IEEE TRANS. PATTERN ANAL. MACH. INTELL , 2007
"... Over the past few decades, a large family of algorithms—supervised or unsupervised; stemming from statistics or geometry theory—has been designed to provide different solutions to the problem of dimensionality reduction. Despite the different motivations of these algorithms, we present in this paper ..."
Abstract - Cited by 271 (29 self) - Add to MetaCart
properties of a data set, with constraints from scale normalization or a penalty graph that characterizes a statistical or geometric property that should be avoided. Furthermore, the graph embedding framework can be used as a general platform for developing new dimensionality reduction algorithms

Platform

by D. Bailey, J. Barton, T. Lasinski, H. Simon , 1994
"... The NAS Parallel Benchmark Kernels in MPL 14of introduced overhead by Mentat as compared to the lower level, hand-coded version of the application, as well as better communications performance 3.4 CG Kernel Performance As in the MG kernel case, our CG implementation was quite similar to the provided ..."
Abstract - Add to MetaCart
to the provided NAS version in its exploitation of opportunities for parallel execution. Unfortunately, we observed memory constraints which prevented running the full sized tests, making performance comparison difficult. Given the observed results, however, it seems likely that our performance would compare
Next 10 →
Results 1 - 10 of 3,087
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University