Sciweavers

4208 search results - page 460 / 842
» Challenges in Evaluating Distributed Algorithms
Sort
View
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
15 years 10 months ago
Practical Proactive Integrity Preservation: A Basis for Malware Defense
Unlike today’s reactive approaches, information flow based approaches can provide positive assurances about overall system integrity, and hence can defend against sophisticated...
Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karan...
P2P
2007
IEEE
156views Communications» more  P2P 2007»
15 years 10 months ago
Completeness Estimation of Range Queries in Structured Overlays
Range queries are a very powerful tool in a wide range of data management systems and are vital to a multitude of applications. The hierarchy of structured overlay systems can be ...
Marcel Karnstedt, Kai-Uwe Sattler, Roman Schmidt
WIMOB
2007
IEEE
15 years 10 months ago
A Gossip Protocol to Support Service Discovery with Heterogeneous Ontologies in MANETs
Service discovery in mobile ad hoc networks (MANETs) is an integral part for collective application interoperability. The discovery process must cope not only with transient commun...
Andronikos Nedos, Kulpreet Singh, Raymond Cunningh...
ACCV
2007
Springer
15 years 10 months ago
Learning Generative Models for Monocular Body Pose Estimation
We consider the problem of monocular 3d body pose tracking from video sequences. This task is inherently ambiguous. We propose to learn a generative model of the relationship of bo...
Tobias Jaeggli, Esther Koller-Meier, Luc J. Van Go...
BTW
2007
Springer
185views Database» more  BTW 2007»
15 years 10 months ago
Data Staging for OLAP- and OLTP-Applications on RFID Data
: The emerging trend towards seamless monitoring of all business processes via comprehensive sensor networks – in particular RFID readers – creates new data management challeng...
Stefan Krompass, Stefan Aulbach, Alfons Kemper