Sciweavers

3536 search results - page 458 / 708
» Local dependent components
Sort
View
ATC
2007
Springer
15 years 11 months ago
Enhancing Grid Security Using Trusted Virtualization
Abstract. Grid applications have increasingly sophisticated functional and security requirements. However, current techniques mostly protect only the resource provider from attacks...
Hans Löhr, HariGovind V. Ramasamy, Ahmad-Reza...
CAIP
2007
Springer
106views Image Analysis» more  CAIP 2007»
15 years 11 months ago
A New Manifold Representation for Visual Speech Recognition
In this paper, we propose a new manifold representation capable of being applied for visual speech recognition. In this regard, the real time input video data is compressed using P...
Dahai Yu, Ovidiu Ghita, Alistair Sutherland, Paul ...
SAFECOMP
2007
Springer
15 years 11 months ago
Using Deductive Cause-Consequence Analysis (DCCA) with SCADE
Abstract. Esterel Technologies’ SCADE Suite is one of the most important development tools for software for safety-critical systems. It is used for designing many critical compon...
Matthias Güdemann, Frank Ortmeier, Wolfgang R...
SCIA
2007
Springer
111views Image Analysis» more  SCIA 2007»
15 years 11 months ago
Scale-Space Texture Classification Using Combined Classifiers
Abstract. Since texture is scale dependent, multi-scale techniques are quite useful for texture classification. Scale-space theory introduces multi-scale differential operators. In...
Mehrdad J. Gangeh, Bart M. ter Haar Romeny, C. Esw...
150
Voted
SAC
2006
ACM
15 years 11 months ago
Distributed context management in a mobility and adaptation enabling middleware (MADAM)
CT As computing devices are getting smaller, we tend to bring them everywhere. Consequently the operating conditions of the devices are constantly changing (e.g. changing user requ...
Marius Mikalsen, Nearchos Paspallis, Jacqueline Fl...