Sciweavers

12562 search results - page 2396 / 2513
» Distributed Xbean Applications
Sort
View
CORR
2010
Springer
121views Education» more  CORR 2010»
14 years 10 months ago
Asynchronous Bounded Expected Delay Networks
We propose a natural generalisation of asynchronous bounded delay (ABD) network models. The commonly used ABD models assume a known bound on message delay. This assumption is ofte...
Rena Bakhshi, Jörg Endrullis, Wan Fokkink, Ju...
CORR
2010
Springer
186views Education» more  CORR 2010»
14 years 10 months ago
Channel Estimation for Opportunistic Spectrum Access: Uniform and Random Sensing
The knowledge of channel statistics can be very helpful in making sound opportunistic spectrum access decisions. It is therefore desirable to be able to efficiently and accurately...
Quanquan Liang, Mingyan Liu
CONCURRENCY
2008
104views more  CONCURRENCY 2008»
14 years 10 months ago
PERMIS: a modular authorization infrastructure
Authorization infrastructures manage privileges and render access control decisions, allowing applications to adjust their behavior according to the privileges allocated to users....
David W. Chadwick, Gansen Zhao, Sassa Otenko, Roma...
CORR
2008
Springer
123views Education» more  CORR 2008»
14 years 10 months ago
Optimizing Web Sites for Customer Retention
With customer relationship management (CRM) companies move away from a mainly product-centered view to a customer-centered view. Resulting from this change, the effective manageme...
Michael Hahsler
CORR
2008
Springer
100views Education» more  CORR 2008»
14 years 10 months ago
Statistical region-based active contours with exponential family observations
In this paper, we focus on statistical region-based active contour models where image features (e.g. intensity) are random variables whose distribution belongs to some parametric ...
François Lecellier, Stéphanie Jehan-...
« Prev « First page 2396 / 2513 Last » Next »