Sciweavers

3424 search results - page 493 / 685
» Building Diverse Computer Systems
Sort
View
MVA
2000
249views Computer Vision» more  MVA 2000»
15 years 5 months ago
3D City Modeling with Laser Range Data and 2D Maps
Visualizations and simulations in an urban environment need 3D digital maps rather than traditional 2D maps, and constructing 3D maps from multiple data sources has become a promi...
Pingtao Wang, Takeshi Doihara, Kazuo Oda, Wei Lu
ICDCS
2006
IEEE
15 years 10 months ago
ASAP: an AS-Aware Peer-Relay Protocol for High Quality VoIP
Peer-to-peer (P2P) technology has been successfully applied in Internet telephony or Voice over Internet Protocol (VoIP), such as the Skype system, where P2P is used for both sear...
Shansi Ren, Lei Guo, Xiaodong Zhang
SIGUCCS
2005
ACM
15 years 10 months ago
A case study: implementing novell identity management at Drew University
Starting in 2003, Drew University began a process to replace its manual account management procedures with an automated provisioning system based upon Novell technologies. Over th...
E. Axel Larsson
DLOG
1998
15 years 5 months ago
Comparing Subsumption Optimizations
Effective systems for expressive description logics require a heavily-optimised subsumption checker incorporating a range of optimisation techniques. Because of the correspondence...
Ian Horrocks, Peter F. Patel-Schneider
ISW
2010
Springer
15 years 2 months ago
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
Xinyuan Wang, Xuxian Jiang