Sciweavers

1683 search results - page 236 / 337
» A Needed Narrowing Strategy
Sort
View
100
Voted
CSFW
2000
IEEE
15 years 4 months ago
Confidentiality for Mobile Code: The Case of a Simple Payment Protocol
We propose an approach to support confidentiality for mobile implementations of security-sensitive protocols using Java/JVM. An applet which receives and passes on confidential in...
Mads Dam, Pablo Giambiagi
93
Voted
PPSN
2000
Springer
15 years 4 months ago
A Hybrid GA for the Edge-Biconnectivity Augmentation Problem
In the design of communication networks, robustness against failures in single links or nodes is an important issue. This paper proposes a new approach for the NP-complete edge-bic...
Ivana Ljubic, Günther R. Raidl, Jozef Kratica
105
Voted
CVPR
1997
IEEE
15 years 4 months ago
Empirical Bayesian EM-based Motion Segmentation
A recent trend in motion-based segmentation has been to rely on statistical procedures derived from ExpectationMaximization (EM) principles. EM-based approaches have various attra...
Nuno Vasconcelos, Andrew Lippman
111
Voted
ICDCS
1995
IEEE
15 years 4 months ago
Implementing Sequentially Consistent Shared Objects Using Broadcast and Point-to-Point Communication
A distributed algorithm that implements a sequentially consistent collection of shared read/update objects using a combination of broadcast and point-to-point communication is pre...
Alan Fekete, M. Frans Kaashoek, Nancy A. Lynch
ICMCS
1995
IEEE
157views Multimedia» more  ICMCS 1995»
15 years 4 months ago
A Scalable Video-on-Demand Service for the Provision of VCR-Like Functions
– One approach to supporting continuous media traffic is via resource reservation at connection establishment time. The shortcomings of this approach are the lack of flexibility...
Huang-Jen Chen, A. Krishnamurthy, Thomas D. C. Lit...