Sciweavers

140 search results - page 22 / 28
» Implementing Preservation Strategies for Complex Multimedia ...
Sort
View
78
Voted
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
15 years 3 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
IUI
2004
ACM
15 years 3 months ago
Qualitative physics in virtual environments
In this paper, we describe a new approach to the creation of virtual environments, which uses qualitative physics to implement object behaviour. We adopted Qualitative Process The...
Marc Cavazza, Simon Hartley, Jean-Luc Lugrin, Mika...
EUROPAR
2007
Springer
15 years 3 months ago
Esodyp+: Prefetching in the Jackal Software DSM
Abstract. Prefetching transfers a data item in advance from its storage location to its usage location so that communication is hidden and does not delay computation. We present a ...
Michael Klemm, Jean Christophe Beyler, Ronny T. La...
ICRA
2002
IEEE
146views Robotics» more  ICRA 2002»
15 years 2 months ago
Real-Time Combinatorial Tracking of a Target Moving Unpredictably among Obstacles
Abstract—Many applications require continuous monitoring of a moving target by a controllable vision system. Although the goal of tracking objects is not new, traditional techniq...
Héctor H. González-Baños, Che...
ICCVW
1999
Springer
15 years 1 months ago
A General Method for Feature Matching and Model Extraction
Abstract. Popular algorithms for feature matching and model extraction fall into two broad categories, generate-and-test and Hough transform variations. However, both methods su er...
Clark F. Olson