Sciweavers

871 search results - page 96 / 175
» A Decentralized Authorization Architecture
Sort
View
NIPS
1996
14 years 11 months ago
Interpreting Images by Propagating Bayesian Beliefs
A central theme of computational vision research has been the realization that reliable estimation of local scene properties requires propagating measurements across the image. Ma...
Yair Weiss
HICSS
2008
IEEE
165views Biometrics» more  HICSS 2008»
15 years 4 months ago
Can a P2P File-Sharing Network Become an e-Marketplace?
The prevalence of P2P technology contributes the ease of file-sharing, but it also brings some problems such as free-riding and copyright infringement. To solve these problems, ma...
Fu-ren Lin, Hau-ming Lo, Cong-ren Wang
ASPLOS
2006
ACM
15 years 3 months ago
Manitou: a layer-below approach to fighting malware
Unbeknownst to many computer users, their machines are running malware. Others are aware that strange software inhabits their machine, but cannot get rid of it. In this paper, we ...
Lionel Litty, David Lie
POLICY
2004
Springer
15 years 3 months ago
Policy Based Management for Internet Communities
Policy Based Management (PBM) is a research topic that has been driven by the tremendous complexity inherent in the administration and management of present-day networking and tel...
Kevin Chekov Feeney, David Lewis, Vincent P. Wade
FLAIRS
2008
15 years 5 days ago
Longboard: A Sketch Based Intelligent Storyboarding Tool for Creating Machinima
Real-time 3D game environments provide a compelling medium for cinematic storytelling. Professional filmmakers have started using them for pre-visualization. They provide a low-co...
Arnav Jhala, Curtis Rawls, Samuel Munilla, R. Mich...