Sciweavers

10396 search results - page 1905 / 2080
» Deployment Support Network
Sort
View
ICIAP
2003
ACM
15 years 7 months ago
PCA vs low resolution images in face verification
Principal Components Analysis (PCA) has been one of the most applied methods for face verification using only 2D information, in fact, PCA is practically the method of choice for ...
Cristina Conde, Antonio Ruiz, Enrique Cabello
115
Voted
EUROSYS
2010
ACM
15 years 6 months ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry
CCGRID
2002
IEEE
15 years 6 months ago
Latency Performance of SOAP Implementations
Abstract— This paper presents an experimental evaluation of the latency performance of several implementations of Simple Object Access Protocol (SOAP) operating over HTTP, and co...
Dan Davis, Manish Parashar
ECRTS
2002
IEEE
15 years 6 months ago
The FTT-Ethernet Protocol: Merging Flexibility, Timeliness and Efficiency
Despite having been designed to interconnect office equipment such as computers and printers, since its early days Ethernet has also been considered for use in the industrial doma...
Paulo Pedreiras, Luís Almeida, Paolo Gai
HICSS
2002
IEEE
128views Biometrics» more  HICSS 2002»
15 years 6 months ago
Flexible Instructional Strategies for E-learning
This paper provides an overview on a German lighthouse research project called L3 in the area of e-learning systems that supply e-learning services via a virtual private network. ...
Michael Altenhofen, Joachim Schaper
« Prev « First page 1905 / 2080 Last » Next »