Sciweavers

1929 search results - page 326 / 386
» Change Propagation Analysis Using Domain Information
Sort
View
AAAI
2011
14 years 4 months ago
Exploiting Phase Transition in Latent Networks for Clustering
In this paper, we model the pair-wise similarities of a set of documents as a weighted network with a single cutoff parameter. Such a network can be thought of an ensemble of unwe...
Vahed Qazvinian, Dragomir R. Radev
WER
2007
Springer
15 years 10 months ago
Role-Based Access Control Requirements Model with Purpose Extension
Role-Based Access Control (RBAC) is increasingly used for ensuring security and privacy in complex organizations such as healthcare institutions. In RBAC, access permissions are g...
Faranak Farzad, Eric Yu, Patrick C. K. Hung
CGI
2003
IEEE
15 years 9 months ago
Automatic Tracking of Face Sequences in MPEG Video
Human faces are commonly found in video streams and provide useful information for video content analysis. This paper presents a robust face tracking system to extract multiple fa...
Yunlong Zhao, Tat-Seng Chua
APNOMS
2006
Springer
15 years 7 months ago
Improved Handoff Performance Based on Pre-binding Update in HMIPv6
Abstract. In this paper, an efficient neighbor AR (Access Router) discovery scheme and handoff procedure using neighbor information are proposed. It allows each AR and Mobility Anc...
Jongpil Jeong, Min Young Chung, Hyunseung Choo
ACMSE
2008
ACM
15 years 6 months ago
Gnutella: integrating performance and security in fully decentralized P2P models
Peer-To-Peer (P2P) systems have made an enormous impact on the Internet, directly affecting its performance and security. The litigation against P2P file sharing has led some desi...
Rossana Motta, Wickus Nienaber, Jon Jenkins