Sciweavers

564 search results - page 96 / 113
» Cold topics in networking
Sort
View
HICSS
2005
IEEE
163views Biometrics» more  HICSS 2005»
15 years 3 months ago
PET: A PErsonalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing
— Building a good cooperation in the P2P resource sharing is a fundamental and challenging research topic because of peer anonymity, peer independence, high dynamics of peer beha...
Zhengqiang Liang, Weisong Shi
70
Voted
ICCV
2005
IEEE
15 years 3 months ago
Phase Field Models and Higher-Order Active Contours
The representation and modelling of regions is an important topic in computer vision. In this paper, we represent a region via a level set of a ‘phase field’ function. The fu...
Marie Rochery, Ian Jermyn, Josiane Zerubia
LCPC
2005
Springer
15 years 3 months ago
Code Transformations for One-Pass Analysis
With the growing popularity of streaming data model, processing queries over streaming data has become an important topic. Streaming data has received attention in a number of comm...
Xiaogang Li, Gagan Agrawal
MOBIDE
2003
ACM
15 years 2 months ago
Semantically driven service interoperability for pervasive computing
The common vision of pervasive computing environments requires a very large range of devices and software components to interoperate seamlessly. From the assumption that these dev...
Declan O'Sullivan, David Lewis
XMLSEC
2003
ACM
15 years 2 months ago
First experiences using XACML for access control in distributed systems
Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as com...
Markus Lorch, Seth Proctor, Rebekah Lepro, Dennis ...