Sciweavers

7918 search results - page 1572 / 1584
» Model Composition Directives
Sort
View
PRL
2007
287views more  PRL 2007»
14 years 9 months ago
2D and 3D face recognition: A survey
Government agencies are investing a considerable amount of resources into improving security systems as result of recent terrorist events that dangerously exposed flaws and weakn...
Andrea F. Abate, Michele Nappi, Daniel Riccio, Gab...
RAS
2007
148views more  RAS 2007»
14 years 9 months ago
Including probabilistic target detection attributes into map representations
Range measuring sensors can play an extremely important role in robot navigation. All range measuring devices rely on a ‘detection criterion’ made in the presence of noise, to...
John Mullane, Ebi Jose, Martin David Adams, Wijeru...
SAC
2008
ACM
14 years 9 months ago
A cost-driven approach to role engineering
In recent years role-based access control (RBAC) has been spreading within organizations. However, companies still have considerable difficulty migrating to this model, due to the...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
BPSC
2010
194views Business» more  BPSC 2010»
14 years 8 months ago
Ad-hoc Management Capabilities for Distributed Business Processes
: Advanced business processes are mostly distributed and require highly flexible management capabilities. In such scenarios, process parts often leave their initiator’s direct sp...
Sonja Zaplata, Dirk Bade, Kristof Hamann, Winfried...
INFOCOM
2010
IEEE
14 years 8 months ago
Elastic Rate Limiting for Spatially Biased Wireless Mesh Networks
—IEEE 802.11-based mesh networks can yield a throughput distribution among nodes that is spatially biased, with traffic originating from nodes that directly communicate with the...
Vincenzo Mancuso, Omer Gurewitz, Ahmed Khattab, Ed...
« Prev « First page 1572 / 1584 Last » Next »