Sciweavers

2861 search results - page 455 / 573
» Modelling Adaptive Systems in ForSyDe
Sort
View
CSREASAM
2006
15 years 5 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
HPDC
2007
IEEE
15 years 8 months ago
MOB: zero-configuration high-throughput multicasting for grid applications
Grid applications often need to distribute large amounts of data efficiently from one cluster to multiple others (multicast). Existing methods usually arrange nodes in optimized t...
Mathijs den Burger, Thilo Kielmann
ADHOC
2008
103views more  ADHOC 2008»
15 years 4 months ago
Impact of sensor-enhanced mobility prediction on the design of energy-efficient localization
Energy efficiency and positional accuracy are often contradictive goals. We propose to decrease power consumption without sacrificing significant accuracy by developing an energy-...
Chuang-Wen You, Polly Huang, Hao-Hua Chu, Yi-Chao ...
CN
2006
104views more  CN 2006»
15 years 4 months ago
Slot allocation schemes for delay sensitive traffic support in asynchronous wireless mesh networks
Heterogeneous multihop wireless networks such as wireless mesh networks consist of a set of resource-constrained mobile nodes that want to communicate with each other and a set of...
V. Vidhyashankar, B. S. Manoj, C. Siva Ram Murthy
ECCV
2006
Springer
16 years 6 months ago
Covariant Derivatives and Vision
Abstract. We describe a new theoretical approach to Image Processing and Vision. Expressed in mathemetical terminology, in our formalism image space is a fibre bundle, and the imag...
Todor Georgiev