Sciweavers

3134 search results - page 172 / 627
» Computing full disjunctions
Sort
View
165
Voted
SPW
2005
Springer
15 years 9 months ago
Countering Automated Exploits with System Security CAPTCHAS
Abstract. Many users routinely log in to their system with system administrator privileges. This is especially true of home users. The advantage of this setup is that these users c...
Dinan Gunawardena, Jacob Scott, Alf Zugenmaier, Au...
SAC
2004
ACM
15 years 9 months ago
Self-maintained distributed tuples for field-based coordination in dynamic networks
Field-based coordination is a very promising approach for a wide range of application scenarios in modern dynamic networks. To implement such an approach, one can rely on distribu...
Marco Mamei, Franco Zambonelli
ECCV
2004
Springer
15 years 9 months ago
Human Detection Based on a Probabilistic Assembly of Robust Part Detectors
We describe a novel method for human detection in single images which can detect full bodies as well as close-up views in the presence of clutter and occlusion. Humans are modeled ...
Krystian Mikolajczyk, Cordelia Schmid, Andrew Ziss...
ICDCSW
2003
IEEE
15 years 9 months ago
A Study of the Performance and Parameter Sensitivity of Adaptive Distributed Caching
A self-organized approach to manage a distributed proxy system called Adaptive Distributed Caching (ADC) has been proposed previously. We model each proxy as an autonomous agent th...
Markus J. Kaiser, Kwok Ching Tsui, Jiming Liu
IPPS
2003
IEEE
15 years 9 months ago
Sequence Alignment on the Cray MTA-2
The standard algorithm for alignment of DNA sequences using dynamic programming has been implemented on the Cray MTA-2 (Multithreaded Architecture-2) at ENRI (Electronic Navigatio...
Shahid H. Bokhari, Jon R. Sauer