Sciweavers

4511 search results - page 771 / 903
» Observation Based System Security
Sort
View
CCGRID
2004
IEEE
15 years 1 months ago
Supporting quality of service in a non-dedicated opportunistic environment
In this paper we investigate the utilization of nondedicated, opportunistic resources in a desktop environment to provide statistical assurances to a class of QoS sensitive, soft ...
Jin Liang, Klara Nahrstedt
CIVR
2008
Springer
166views Image Analysis» more  CIVR 2008»
14 years 12 months ago
A probabilistic ranking framework using unobservable binary events for video search
Recent content-based video retrieval systems combine output of concept detectors (also known as high-level features) with text obtained through automatic speech recognition. This ...
Robin Aly, Djoerd Hiemstra, Arjen P. de Vries, Fra...
CSCW
2008
ACM
14 years 10 months ago
Physical and Digital Artifact-Mediated Coordination in Building Design
We conducted an ethnographic field study examining how a building design team used representational artifacts to coordinate the design of building systems, structure, and architect...
Melanie Tory, Sheryl Staub-French, Barry A. Po, Fu...
JEI
2007
102views more  JEI 2007»
14 years 10 months ago
Testing tone mapping operators with human-perceived reality
Abstract. A number of successful tone mapping operators for contrast compression have been proposed due to the need to visualize high dynamic range (HDR) images on low dynamic rang...
Akiko Yoshida, Volker Blanz, Karol Myszkowski, Han...
TWC
2008
120views more  TWC 2008»
14 years 10 months ago
A cartel maintenance framework to enforce cooperation in wireless networks with selfish users
Abstract-- In distributed wireless networks without centralized control, each user is its own authority to maximize its own performance. This distributed characteristic provides th...
Zhu Han, Zhu Ji, K. J. Ray Liu