Sciweavers

3618 search results - page 521 / 724
» Additive functions for number systems in function fields
Sort
View
CVPR
2010
IEEE
16 years 1 months ago
Locality-constrained Linear Coding for Image Classification
The traditional SPM approach based on bag-of-features (BoF) must use nonlinear classifiers to achieve good image classification performance. This paper presents a simple but effec...
Jinjun Wang, Jianchao Yang, Kai Yu, Fengjun Lv
CSE
2009
IEEE
15 years 11 months ago
A Framework for Enforcing Constrained RBAC Policies
—Constraints are an important part of role-based access control policies. The safety or security of a system is maintained by enforcing constraints that are specified in the pol...
Jason Crampton, Hemanth Khambhammettu
MDM
2009
Springer
138views Communications» more  MDM 2009»
15 years 11 months ago
SLA-Aware Adaptive On-demand Data Broadcasting in Wireless Environments
—In mobile and wireless networks, data broadcasting for popular data items enables the efficient utilization of the limited wireless bandwidth. However, efficient data scheduli...
Adrian Daniel Popescu, Mohamed A. Sharaf, Cristian...
CDC
2008
IEEE
187views Control Systems» more  CDC 2008»
15 years 11 months ago
Controlled random access MAC for network utility maximization in wireless networks
— There has been much recent interest in protocol design for wireless networks based on maximizing a network utility function. A significant advance in recent years is the obser...
Robert J. McCabe, Nikolaos M. Freris, P. R. Kumar
127
Voted
HICSS
2008
IEEE
120views Biometrics» more  HICSS 2008»
15 years 11 months ago
Optimizing the Supplier Selection and Service Portfolio of a SOA Service Integrator
The Service-Oriented Architecture (SOA) paradigm promises to enable software vendors to compose software systems using services purchased from various suppliers. In this paper, we...
Jan Christian Lang, Thomas Widjaja, Peter Buxmann,...