Sciweavers

1769 search results - page 278 / 354
» An implementation of argument based discussion
Sort
View
SISW
2003
IEEE
15 years 5 months ago
Fast and Secure Magnetic WORM Storage Systems
Computer forensic analysis, intrusion detection and disaster recovery are all dependent on the existence of trustworthy log files. Current storage systems for such log files are...
Yongge Wang, Yuliang Zheng
COMPGEOM
2003
ACM
15 years 5 months ago
Updating and constructing constrained delaunay and constrained regular triangulations by flips
I discuss algorithms based on bistellar flips for inserting and deleting constraining (d − 1)-facets in d-dimensional constrained Delaunay triangulations (CDTs) and weighted CD...
Jonathan Richard Shewchuk
PADS
2003
ACM
15 years 5 months ago
Maya: a Multi-Paradigm Network Modeling Framework
This paper presents Maya, a multi-paradigm, scalable and extensible network modeling framework for emulating distributed applications. A novel three-tier architecture is proposed ...
Junlan Zhou, Zhengrong Ji, Mineo Takai, Rajive Bag...
CAIP
2003
Springer
176views Image Analysis» more  CAIP 2003»
15 years 5 months ago
Evaluation of an Adaptive Composite Gaussian Model in Video Surveillance
Video surveillance systems seek to automatically identify events of interest in a variety of situations. Extracting a moving object from background is the most important step of t...
Qi Zang, Reinhard Klette
DSVIS
2003
Springer
15 years 5 months ago
Improving User Interface Usability Using Mobile Agents
Adapting graphical user interface (GUI) to meet higher level of usability for users is one of the most interesting questions of today’s mobile computation. Users should have GUI ...
Nikola Mitrovic, Eduardo Mena