Sciweavers

1270 search results - page 179 / 254
» IF Validation Environment Tutorial
Sort
View
WOWMOM
2006
ACM
191views Multimedia» more  WOWMOM 2006»
15 years 8 months ago
Privacy Preserving Trust Authorization Framework Using XACML
: Nowadays many organisations share sensitive services through open network systems and this raises the need for an authorization framework that can interoperate even when the part...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
115
Voted
HICSS
2005
IEEE
109views Biometrics» more  HICSS 2005»
15 years 8 months ago
Staffing Software Maintenance and Support Projects
In the past decade outsourcing a software system’s support and maintenance has become relatively common across most organizations. In this paper we consider a few issues governi...
Jai Asundi, Sumit Sarkar
113
Voted
IAT
2005
IEEE
15 years 8 months ago
Trust Model for Open Ubiquitous Agent Systems
Trust management model that we present is adapted for ubiquitous devices cooperation, rather than for classic client-supplier relationship. We use fuzzy numbers to represent trust...
Martin Rehák, Lukás Foltýn, M...
115
Voted
ICMCS
2005
IEEE
103views Multimedia» more  ICMCS 2005»
15 years 8 months ago
Using spatial cues for meeting speech segmentation
This work investigates the validity and accuracy of using spatial cues with Time-Delay Estimation (TDE) as a method of segmenting multichannel recorded speech by speaker location....
Eva Cheng, Jason Lukasiak, Ian S. Burnett, David S...
112
Voted
ICRA
2005
IEEE
143views Robotics» more  ICRA 2005»
15 years 8 months ago
Cooperative Multi-Robot Systems A study of Vision-based 3-D Mapping using Information Theory
Building cooperatively 3-D maps of unknown environments is one of the application fields of multi-robot systems. This article addressesthatproblemthroughaprobabilisticapproachbas...
Rui Rocha, Jorge Dias, Adriano Carvalho