Sciweavers

8655 search results - page 1391 / 1731
» Challenges for Trusted Computing
Sort
View
CCR
2006
110views more  CCR 2006»
15 years 3 months ago
On the feasibility of commercial, legal P2P content distribution
A spirited panel was recently held at the 10th International Web Caching and Content Distribution workshop on the future of P2P in content distribution [1]. After more than ten ye...
Pablo Rodriguez, See-Mong Tan, Christos Gkantsidis
CORR
2006
Springer
104views Education» more  CORR 2006»
15 years 3 months ago
Turning Cluster Management into Data Management: A System Overview
This paper introduces the CondorJ2 cluster management system. Traditionally, cluster management systems such as Condor employ a process-oriented approach with little or no use of ...
Eric Robinson, David J. DeWitt
CORR
2006
Springer
104views Education» more  CORR 2006»
15 years 3 months ago
Unmanaged Internet Protocol: Taming the Edge Network Management Crisis
Though appropriate for core Internet infrastructure, the Internet Protocol is unsuited to routing within and between emerging ad-hoc edge networks due to its dependence on hierarc...
Bryan Ford
CVIU
2006
110views more  CVIU 2006»
15 years 3 months ago
Matching actions in presence of camera motion
When the camera viewing an action is moving, the motion observed in the video not only contains the motion of the actor but also the motion of the camera. At each time instant, in...
Alper Yilmaz, Mubarak Shah
DSP
2006
15 years 3 months ago
Adaptive multi-modality sensor scheduling for detection and tracking of smart targets
This paper considers the problem of sensor scheduling for the purposes of detection and tracking of "smart" targets. Smart targets are targets that can detect when they ...
Christopher M. Kreucher, Doron Blatt, Alfred O. He...
« Prev « First page 1391 / 1731 Last » Next »