Sciweavers

5722 search results - page 897 / 1145
» Security Function Interactions
Sort
View
WMI
2001
114views more  WMI 2001»
15 years 5 months ago
A scalable, distributed middleware service architecture to support mobile internet applications
Middleware layers placed between user clients and application servers have been used to perform a variety of functions to support the vision of nomadic computing across varying pla...
Thomas Phan, Richard G. Guy, Rajive Bagrodia
165
Voted
WSCG
2004
212views more  WSCG 2004»
15 years 5 months ago
Face and Hands Segmentation in Color Images and Initial Matching with a Biomechanical Model
In this paper we describe a robust and efficient procedure to detect skin region with homogeneous color values in monocular indoor images. The mathematical background is a functio...
Jose Maria Buades Rubio, Manuel González Hi...
WSCG
2003
185views more  WSCG 2003»
15 years 5 months ago
Complex 3D Feature Registration Using a Marching Template
The registration of 3D form features is essential to the supporting of reverse shape design processes. Extracting an editable shape feature from unordered data points is notorious...
Joris S. M. Vergeest, Sander Spanjaard, Chensheng ...
CASCON
1996
196views Education» more  CASCON 1996»
15 years 5 months ago
Monitoring overhead in distributed systems: visualization and estimation techniques
Monitoring distributed systems involves the collection, analysis, and display of interactions among managed objects. These functions are carried out by the components of a monitor...
Hasina Abdu, Hanan Lutfi Lutfiyya, Michael A. Baue...
146
Voted
ICFP
2010
ACM
15 years 4 months ago
Lolliproc: to concurrency from classical linear logic via curry-howard and control
While many type systems based on the intuitionistic fragment of linear logic have been proposed, applications in programming languages of the full power of linear logic--including...
Karl Mazurak, Steve Zdancewic