Sciweavers

9162 search results - page 1769 / 1833
» System and User Data Complexity
Sort
View
DOCENG
2010
ACM
14 years 11 months ago
APEX: automated policy enforcement eXchange
: APEX: Automated Policy Enforcement eXchange Steven J. Simske, Helen Balinsky HP Laboratories HPL-2010-134 Policy, Text Analysis, Policy Server, Policy Editor, Document Systems, ...
Steven J. Simske, Helen Balinsky
IJVR
2008
208views more  IJVR 2008»
14 years 8 months ago
A View-based Multiple Objects Tracking and Human Action Recognition for Interactive Virtual Environments
As environments become smart in accordance with advances in ubiquitous computing technology, researchers are struggling to satisfy users' diverse and sophisticated demands. Th...
Jin Choi, Yong-il Cho, Kyusung Cho, Su-jung Bae, H...
TMC
2010
103views more  TMC 2010»
14 years 4 months ago
Optimal Cooperative Relaying Schemes in IR-UWB Networks
Cooperation between wireless nodes to retransmit data for the other users introduces multiuser diversity to a wireless network and increases the system throughput. In this paper, t...
Ghasem Naddafzadeh Shirazi, Peng Yong Kong, Chen-K...
CNSR
2011
IEEE
238views Communications» more  CNSR 2011»
14 years 1 months ago
Measurement Study on PPLive Based on Channel Popularity
Abstract—In recent years, Peer-to-Peer (P2P) streaming systems experienced tremendous growth and became one of the largest bandwidth consumer on Internet. PPLive, one of the most...
Ruixuan Li, Guoqiang Gao, Weijun Xiao, Zhiyong Xu
MOBISYS
2011
ACM
14 years 20 days ago
Security versus energy tradeoffs in host-based mobile malware detection
The rapid growth of mobile malware necessitates the presence of robust malware detectors on mobile devices. However, running malware detectors on mobile devices may drain their ba...
Jeffrey Bickford, H. Andrés Lagar-Cavilla, ...
« Prev « First page 1769 / 1833 Last » Next »