Sciweavers

7457 search results - page 1423 / 1492
» The Dynamics of Computing Agent Systems
Sort
View
CCS
2010
ACM
15 years 8 months ago
Effective trust management through a hybrid logical and relational approach
Despite a plethora of recent research regarding trust management approaches to authorization, relatively little attention has been given to exactly how these technologies can be e...
Adam J. Lee, Ting Yu, Yann Le Gall
UIST
2009
ACM
15 years 8 months ago
Activity analysis enabling real-time video communication on mobile phones for deaf users
We describe our system called MobileASL for real-time video communication on the current U.S. mobile phone network. The goal of MobileASL is to enable Deaf people to communicate w...
Neva Cherniavsky, Jaehong Chon, Jacob O. Wobbrock,...
INFOCOM
2006
IEEE
15 years 7 months ago
Intelligent Distribution of Intrusion Prevention Services on Programmable Routers
— The recent surge of new viruses and host attacks in the Internet and the tremendous propagation speed of selfdistributing attacks has made network security a pressing issue. To...
Andreas Hess, Hans-Florian Geerdes, Roland Wess&au...
106
Voted
SENSYS
2006
ACM
15 years 7 months ago
Supporting concurrent applications in wireless sensor networks
It is vital to support concurrent applications sharing a wireless sensor network in order to reduce the deployment and administrative costs, thus increasing the usability and efï¬...
Yang Yu, Loren J. Rittle, Vartika Bhandari, Jason ...
WACV
2005
IEEE
15 years 7 months ago
Integrating Range and Texture Information for 3D Face Recognition
The performance of face recognition systems that use two-dimensional images depends on consistent conditions w.r.t. lighting, pose, and facial appearance. We are developing a face...
Xiaoguang Lu, Anil K. Jain
« Prev « First page 1423 / 1492 Last » Next »