Sciweavers

483 search results - page 72 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
WWW
2006
ACM
15 years 10 months ago
Semantic WS-agreement partner selection
In a dynamic service oriented environment it is desirable for service consumers and providers to offer and obtain guarantees regarding their capabilities and requirements. WS-Agre...
Nicole Oldham, Kunal Verma, Amit P. Sheth, Farshad...
ISCAS
2008
IEEE
230views Hardware» more  ISCAS 2008»
15 years 3 months ago
Joint optimization of data hiding and video compression
— From copyright protection to error concealment, video data hiding has found usage in a great number of applications. Recently proposed applications such as privacy data preserv...
Jithendra K. Paruchuri, Sen-Ching S. Cheung
GLOBECOM
2006
IEEE
15 years 3 months ago
A Coverage-Preserving and Hole Tolerant Based Scheme for the Irregular Sensing Range in Wireless Sensor Networks
— Coverage is an important issue related to WSN quality of service. Several centralized/decentralized solutions based on the geometry information of sensors and under the assumpt...
Azzedine Boukerche, Xin Fei, Regina Borges de Arau...
CAD
2010
Springer
14 years 9 months ago
AR interfacing with prototype 3D applications based on user-centered interactivity
Augmented Reality (AR) has been acclaimed as one of the promising technologies for advancing future UbiComp (Ubiquitous Computing) environments. Despite a myriad of AR application...
Seungjun Kim, Anind K. Dey
AAAI
1997
14 years 10 months ago
DISXPERT: A Social Security Disability Screening Expert System
This case study paper reports on the development and implementation of DISXPERT, a rule-based expert system tool for referral of social security disability recipients to vocationa...
James R. Nolan