Sciweavers

448 search results - page 88 / 90
» Active Matching
Sort
View
JIPS
2007
223views more  JIPS 2007»
13 years 4 months ago
Addressing Mobile Agent Security through Agent Collaboration
: The use of agent paradigm in today’s applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execut...
Evens Jean, Yu Jiao, Ali R. Hurson
JOT
2002
105views more  JOT 2002»
13 years 4 months ago
Java Distributed Separate Objects
Java supports distributed programming using threads and Remote Method Invocation (JRMI). However, a Java thread does not match well with the object concept, and JRMI cannot easily...
Miguel Katrib, Iskander Sierra, Mario del Valle, T...
PAMI
2007
157views more  PAMI 2007»
13 years 4 months ago
The Asymmetry of Image Registration and Its Application to Face Tracking
Most image registration problems are formulated in an asymmetric fashion. Given a pair of images, one is implicitly or explicitly regarded as a template, and warped onto the other...
Göksel Dedeoglu, Takeo Kanade, Simon Baker
WINET
2010
180views more  WINET 2010»
13 years 3 months ago
An analytical model for performance evaluation of multimedia applications over EDCA in an IEEE 802.11e WLAN
—We extend the modeling heuristic of [1] to evaluate the performance of an IEEE 802.11e infrastructure network carrying packet telephone calls, streaming video sessions and TCP c...
Sri Harsha, Anurag Kumar, Vinod Sharma
ACL
2010
13 years 2 months ago
Hunting for the Black Swan: Risk Mining from Text
In the business world, analyzing and dealing with risk permeates all decisions and actions. However, to date, risk identification, the first step in the risk management cycle, has...
Jochen L. Leidner, Frank Schilder