Sciweavers

6047 search results - page 1048 / 1210
» Modeling with Extend
Sort
View
RTS
2006
115views more  RTS 2006»
15 years 1 months ago
Resource access control for dynamic priority distributed real-time systems
Many of today's complex computer applications are being modeled and constructed using the principles inherent to real-time distributed object systems. In response to this dem...
Chen Zhang, David Cordes
IJCSA
2007
143views more  IJCSA 2007»
15 years 1 months ago
Incremental Trade-Off Management for Preference-Based Queries
Preference-based queries often referred to as skyline queries play an important role in cooperative query processing. However, their prohibitive result sizes pose a severe challen...
Wolf-Tilo Balke, Ulrich Güntzer, Christoph Lo...
TASE
2008
IEEE
15 years 1 months ago
Sensor Selection in Arbitrary Dimensions
We address the sensor selection problem which arises in tracking and localization applications. In sensor selection, the goal is to select a small number of sensors whose measureme...
Volkan Isler, Malik Magdon-Ismail
TCS
2008
15 years 1 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
IVC
2007
266views more  IVC 2007»
15 years 1 months ago
Face detection and facial feature localization without considering the appearance of image context
Face and facial feature detection plays an important role in various applications such as human computer interaction, video surveillance, face tracking, and face recognition. Effi...
Suphakant Phimoltares, Chidchanok Lursinsap, Kosin...
« Prev « First page 1048 / 1210 Last » Next »