Sciweavers

12183 search results - page 2361 / 2437
» Computers under Attacks!
Sort
View
EMSOFT
2006
Springer
15 years 3 months ago
New approach to architectural synthesis: incorporating QoS constraint
Embedded applications like video decoding, video streaming and those in the network domain, typically have a Quality of Service (QoS) requirement which needs to be met. Apart from...
Harsh Dhand, Basant Kumar Dwivedi, M. Balakrishnan
CCS
2000
ACM
15 years 3 months ago
PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet
The Internet provides an environment where two parties, who are virtually strangers to each other, can make connections and do business together. Before any actual business starts...
Ting Yu, Xiaosong Ma, Marianne Winslett
FAABS
2000
Springer
15 years 3 months ago
Design and Mathematical Analysis of Agent-Based Systems
Abstract. Agent-based systems that are composed of simple locally interacting agents but which demonstrate complex group behavior o er several advantages over traditional multi-age...
Kristina Lerman
ISMIR
2000
Springer
128views Music» more  ISMIR 2000»
15 years 3 months ago
PROMS: A Web-based Tool for Searching in Polyphonic Music
One major task of a digital music library (DML) is to provide techniques to locate a queried musical pattern in all pieces of music in the database containing that pattern. For a ...
Michael Clausen, R. Engelbrecht, D. Meyer, J. Schm...
MICAI
2000
Springer
15 years 3 months ago
Eigenfaces Versus Eigeneyes: First Steps Toward Performance Assessment of Representations for Face Recognition
The Principal Components Analysis (PCA) is one of the most successfull techniques that have been used to recognize faces in images. This technique consists of extracting the eigenv...
Teófilo Emídio de Campos, Rogé...
« Prev « First page 2361 / 2437 Last » Next »