Sciweavers

483 search results - page 72 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
WWW
2006
ACM
16 years 13 days ago
Semantic WS-agreement partner selection
In a dynamic service oriented environment it is desirable for service consumers and providers to offer and obtain guarantees regarding their capabilities and requirements. WS-Agre...
Nicole Oldham, Kunal Verma, Amit P. Sheth, Farshad...
ISCAS
2008
IEEE
230views Hardware» more  ISCAS 2008»
15 years 6 months ago
Joint optimization of data hiding and video compression
— From copyright protection to error concealment, video data hiding has found usage in a great number of applications. Recently proposed applications such as privacy data preserv...
Jithendra K. Paruchuri, Sen-Ching S. Cheung
GLOBECOM
2006
IEEE
15 years 5 months ago
A Coverage-Preserving and Hole Tolerant Based Scheme for the Irregular Sensing Range in Wireless Sensor Networks
— Coverage is an important issue related to WSN quality of service. Several centralized/decentralized solutions based on the geometry information of sensors and under the assumpt...
Azzedine Boukerche, Xin Fei, Regina Borges de Arau...
CAD
2010
Springer
14 years 12 months ago
AR interfacing with prototype 3D applications based on user-centered interactivity
Augmented Reality (AR) has been acclaimed as one of the promising technologies for advancing future UbiComp (Ubiquitous Computing) environments. Despite a myriad of AR application...
Seungjun Kim, Anind K. Dey
AAAI
1997
15 years 1 months ago
DISXPERT: A Social Security Disability Screening Expert System
This case study paper reports on the development and implementation of DISXPERT, a rule-based expert system tool for referral of social security disability recipients to vocationa...
James R. Nolan