Sciweavers

7651 search results - page 1466 / 1531
» Information integration in the enterprise
Sort
View
IPPS
2005
IEEE
15 years 7 months ago
On the Optimal Placement of Secure Data Objects over Internet
Secret sharing algorithms have been used for intrusion tolerance, which ensure the confidentiality, integrity and availability of critical information. However, dynamically changi...
Manghui Tu, Peng Li, Qingkai Ma, I-Ling Yen, Farok...
ISCC
2005
IEEE
101views Communications» more  ISCC 2005»
15 years 7 months ago
Comparing and Evaluating Lightweight Solutions for Replica Dissemination and Retrieval in Dense MANETs
There is an emerging market interest in service provisioning over dense Mobile Ad-hoc NETworks (MANETs), i.e., limited spatial regions, such as shopping malls, airports, and unive...
Paolo Bellavista, Antonio Corradi, Eugenio Magistr...
ISPAN
2005
IEEE
15 years 7 months ago
Supervised Peer-to-Peer Systems
In this paper we present a general methodology for designing supervised peer-to-peer systems. A supervised peer-to-peer system is a system in which the overlay network is formed b...
Kishore Kothapalli, Christian Scheideler
IWPSE
2005
IEEE
15 years 7 months ago
EvoLens: Lens-View Visualizations of Evolution Data
Visualizing software evolution is essential for identifying design erosions that have occurred over the past releases. Making evolutionary aspects explicit via visual representati...
Jacek Ratzinger, Michael Fischer, Harald Gall
WACV
2005
IEEE
15 years 7 months ago
Deformation Analysis for 3D Face Matching
Current two-dimensional image based face recognition systems encounter difficulties with large facial appearance variations due to the pose, illumination and expression changes. ...
Xiaoguang Lu, Anil K. Jain
« Prev « First page 1466 / 1531 Last » Next »