Sciweavers

13841 search results - page 2649 / 2769
» Algorithms and Constraint Programming
Sort
View
ISORC
2009
IEEE
15 years 9 months ago
Component Based Middleware-Synthesis for AUTOSAR Basic Software
Distributed real-time automotive embedded systems have to be highly dependable as well as cost-efficient due to the large number of manufactured units. To close the gap between r...
Dietmar Schreiner, Markus Schordan, Karl M. Gö...
ERCIMDL
2009
Springer
139views Education» more  ERCIMDL 2009»
15 years 9 months ago
Geographic Information Retrieval and Digital Libraries
In this demonstration we will examine the effectiveness of Geographic Information Retrieval (GIR) methods in digital library interfaces. We will show how various types of informat...
Ray R. Larson
ICB
2009
Springer
183views Biometrics» more  ICB 2009»
15 years 9 months ago
Overview of the Multiple Biometrics Grand Challenge
The goal of the Multiple Biometrics Grand Challenge (MBGC) is to improve the performance of face and iris recognition technology from biometric samples acquired under unconstrained...
P. Jonathon Phillips, Patrick J. Flynn, J. Ross Be...
IWCMC
2009
ACM
15 years 9 months ago
Multiple-antenna multiple-relay system with precoding for multiuser transmission
Multi-hop relaying will play a central role in next generation wireless systems. In this paper a novel relaying strategy that uses multiple-input multiple-output (MIMO) relays in ...
Arash Talebi, Witold A. Krzymien
SACMAT
2009
ACM
15 years 9 months ago
Access control policy combining: theory meets practice
Many access control policy languages, e.g., XACML, allow a policy to contain multiple sub-policies, and the result of the policy on a request is determined by combining the result...
Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa B...
« Prev « First page 2649 / 2769 Last » Next »