Sciweavers

7080 search results - page 1072 / 1416
» Designing High Integrity Systems Using Aspects
Sort
View
131
Voted
SIGECOM
2004
ACM
120views ECommerce» more  SIGECOM 2004»
15 years 10 months ago
Robust incentive techniques for peer-to-peer networks
Lack of cooperation (free riding) is one of the key problems that confronts today’s P2P systems. What makes this problem particularly difficult is the unique set of challenges ...
Michal Feldman, Kevin Lai, Ion Stoica, John Chuang
ICPR
2010
IEEE
15 years 6 months ago
Consensus Network Based Hypotheses Combination for Arabic Offline Handwriting Recognition
Offline handwriting recognition (OHR) is an extremely challenging task because of many factors including variations in writing style, writing device and material, and noise in the ...
Rohit Prasad, Matin Kamali, David Belanger, Antti-...
155
Voted
DAC
2011
ACM
14 years 4 months ago
Process-level virtualization for runtime adaptation of embedded software
Modern processor architectures call for software that is highly tuned to an unpredictable operating environment. Processlevel virtualization systems allow existing software to ada...
Kim M. Hazelwood
186
Voted
STORAGESS
2005
ACM
15 years 10 months ago
An approach for fault tolerant and secure data storage in collaborative work environments
We describe a novel approach for building a secure and fault tolerant data storage service in collaborative work environments, which uses perfect secret sharing schemes to store d...
Arun Subbiah, Douglas M. Blough
JEI
2010
120views more  JEI 2010»
15 years 3 months ago
Performance evaluation of mail-scanning cameras
Letter scanning cameras (LSCs) form the front end imaging systems for virtually all mail scanning systems that are currently used to automatically sort mail products. As with any ...
Umesh Rajashekar, Tony Tuan Vu, John E. Hooning, A...
« Prev « First page 1072 / 1416 Last » Next »