Sciweavers

10159 search results - page 1839 / 2032
» System Design Validation Using Formal Models
Sort
View
ACSAC
2002
IEEE
15 years 7 months ago
A Context-Aware Security Architecture for Emerging Applications
We describe an approach to building security services for context-aware environments. Specifically, we focus on the design of security services that incorporate the use of securi...
Michael J. Covington, Prahlad Fogla, Zhiyuan Zhan,...
HUC
2009
Springer
15 years 6 months ago
Applying pervasive technologies to create economic incentives that alter consumer behavior
Economic incentives are a powerful way of shaping consumer behavior towards more commercially efficient and environmentally sustainable patterns. In this paper, we explore the id...
Tetsuo Yamabe, Vili Lehdonvirta, Hitoshi Ito, Hayu...
EUROPAR
2008
Springer
15 years 4 months ago
DGSim: Comparing Grid Resource Management Architectures through Trace-Based Simulation
Abstract. Many advances in grid resource management are still required to realize the grid computing vision of the integration of a worldwide computing infrastructure for scientifi...
Alexandru Iosup, Omer Ozan Sonmez, Dick H. J. Epem...
122
Voted
FORTE
2000
15 years 3 months ago
Systematic Performance Evaluation of Multipoint Protocols
The adventof multipoint(multicast-based) applications and the growth and complexity of the Internet has complicated network protocol design and evaluation. In this paper, we prese...
Ahmed Helmy, Sandeep K. S. Gupta, Deborah Estrin, ...
CVIU
2010
267views more  CVIU 2010»
14 years 11 months ago
Accelerated hardware video object segmentation: From foreground detection to connected components labelling
This paper demonstrates the use of a single-chip FPGA for the segmentation of moving objects in a video sequence. The system maintains highly accurate background models, and integ...
Kofi Appiah, Andrew Hunter, Patrick Dickinson, Hon...
« Prev « First page 1839 / 2032 Last » Next »