Sciweavers

5723 search results - page 1054 / 1145
» Network Management
Sort
View
CN
2004
108views more  CN 2004»
14 years 11 months ago
Smart dust, friend or foe?--Replacing identity with configuration trust
Smart dust motes are miniature self-contained systems that may be deployed in very large numbers. In military applications these devices are subject to different threats than conv...
Howard Chivers, John A. Clark
COMCOM
2004
102views more  COMCOM 2004»
14 years 11 months ago
A scalable architecture for end-to-end QoS provisioning
The Differentiated Services (DiffServ) architecture has been proposed by the Internet Engineering Task Force as a scalable solution for providing end-to-end Quality of Service (Qo...
Spiridon Bakiras, Victor O. K. Li
CVIU
2004
125views more  CVIU 2004»
14 years 11 months ago
Automatic description of complex buildings from multiple images
We present an approach for detecting and describing complex buildings with flat or complex rooftops by using multiple, overlapping images of the scene. We find 3-D rooftop boundar...
Zu Whan Kim, Ramakant Nevatia
DEBU
2000
147views more  DEBU 2000»
14 years 11 months ago
Adaptive Query Processing for Internet Applications
As the area of data management for the Internet has gained in popularity, recent work has focused on effectively dealing with unpredictable, dynamic data volumes and transfer rate...
Zachary G. Ives, Alon Y. Levy, Daniel S. Weld, Dan...
CUZA
2002
129views more  CUZA 2002»
14 years 11 months ago
Ad Hoc Metacomputing with Compeer
Metacomputing allows the exploitation of geographically seperate, heterogenous networks and resources. Most metacomputers are feature rich and carry a long, complicated installati...
Keith Power, John P. Morrison
« Prev « First page 1054 / 1145 Last » Next »