Sciweavers

434 search results - page 48 / 87
» Embedded Intelligence
Sort
View
DRM
2003
Springer
15 years 4 months ago
Digital rights management in a 3G mobile phone and beyond
In this paper we examine how copyright protection of digital items can be securely managed in a 3G mobile phone and other devices. First, the basic concepts, strategies, and requi...
Thomas S. Messerges, Ezzat A. Dabbish
73
Voted
CF
2004
ACM
15 years 4 months ago
An information-interconnectivity-based retrieval method for network attached storage
Network attached disk storage is characterized by independent network attachment and embedded intelligence. For Internet applications, it provides the key functionality of geograp...
Iliyak Georgiev, Ivo I. Georgiev
85
Voted
IWANN
2009
Springer
15 years 3 months ago
Stereo-MAS: Multi-Agent System for Image Stereo Processing
This article presents a distributed agent-based architecture that can process the visual information obtained by stereoscopic cameras. The system is embedded within a global projec...
Sara Rodríguez, Juan Francisco de Paz, Javi...
PC
2007
112views Management» more  PC 2007»
14 years 10 months ago
Service address routing: a network-embedded resource management layer for cluster computing
Service address routing is introduced as a novel and powerful paradigm for the integration of resource management functions into the interconnection fabric of cluster computers. S...
Isaac D. Scherson, Daniel S. Valencia, Enrique Cau...
78
Voted
AAAI
1993
15 years 13 days ago
The Semantics of Event Prevention
In planning tasks an agent may often find himself in a situation demanding that he choose an action that would prevent some unwanted event from occurring. Similarly, in tasks invo...
Charles L. Ortiz Jr.