Sciweavers

1986 search results - page 69 / 398
» An activity based costing approach to systems development an...
Sort
View
111
Voted
SIGCOMM
2010
ACM
15 years 24 days ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long
105
Voted
MMM
2007
Springer
110views Multimedia» more  MMM 2007»
15 years 6 months ago
A Matching-Based Approach for Human Motion Analysis
Abstract. This paper presents a novel approach to implement estimation and recognition of human motion from uncalibrated monocular video sequences. As it is difficult to find a go...
Weilun Lao, Jungong Han, Peter H. N. de With
111
Voted
WSC
2008
15 years 2 months ago
A simplified modeling approach for human system interaction
Despite increasing dependency on technology, the importance of humans is expected to increase and to provide a realistic basis for decision support; both technical and organizatio...
Torbjorn P. E. Ilar
CCGRID
2006
IEEE
15 years 6 months ago
Proposal of MPI Operation Level Checkpoint/Rollback and One Implementation
With the increasing number of processors in modern HPC(High Performance Computing) systems, there are two emergent problems to solve. One is scalability, the other is fault tolera...
Yuan Tang, Graham E. Fagg, Jack Dongarra
WER
2007
Springer
15 years 6 months ago
An Approach to Requirements Encapsulation with Clustering
Requirements encapsulation means organizing software requirements into a set of requirements clusters with tight cohesion along with external interfaces such that each cluster can...
Zude Li, Quazi Abidur Rahman, Nazim H. Madhavji