Sciweavers

7762 search results - page 1538 / 1553
» Availability in BitTorrent Systems
Sort
View
OOPSLA
2010
Springer
14 years 10 months ago
Concurrency by modularity: design patterns, a case in point
General purpose object-oriented programs typically aren’t embarrassingly parallel. For these applications, finding enough concurrency remains a challenge in program design. To ...
Hridesh Rajan, Steven M. Kautz, Wayne Rowcliffe
PAMI
2010
168views more  PAMI 2010»
14 years 10 months ago
Surface-from-Gradients without Discrete Integrability Enforcement: A Gaussian Kernel Approach
—Representative surface reconstruction algorithms taking a gradient field as input enforces the integrability constraint in a discrete manner. While enforcing integrability allo...
Heung-Sun Ng, Tai-Pang Wu, Chi-Keung Tang
PKDD
2010
Springer
188views Data Mining» more  PKDD 2010»
14 years 10 months ago
Semi-supervised Abstraction-Augmented String Kernel for Multi-level Bio-Relation Extraction
ervised Abstraction-Augmented String Kernel for Multi-Level Bio-Relation Extraction Pavel Kuksa1 , Yanjun Qi2 , Bing Bai2 , Ronan Collobert2 , Jason Weston3 , Vladimir Pavlovic1 , ...
Pavel P. Kuksa, Yanjun Qi, Bing Bai, Ronan Collobe...
TDSC
2010
218views more  TDSC 2010»
14 years 10 months ago
Secure Data Objects Replication in Data Grid
—Secret sharing and erasure coding-based approaches have been used in distributed storage systems to ensure the confidentiality, integrity, and availability of critical informati...
Manghui Tu, Peng Li, I-Ling Yen, Bhavani M. Thurai...
TIFS
2010
173views more  TIFS 2010»
14 years 10 months ago
A hybrid approach for generating secure and discriminating face template
Abstract—Biometric template protection is one of the most important issues in deploying a practical biometric system. To tackle this problem, many algorithms, that do not store t...
Yi C. Feng, Pong C. Yuen, Anil K. Jain
« Prev « First page 1538 / 1553 Last » Next »