Sciweavers

12023 search results - page 2398 / 2405
» The K-Rep System Architecture
Sort
View
COMPSAC
2010
IEEE
14 years 7 months ago
Representing and Reasoning about Web Access Control Policies
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effect...
Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong M...
ICPR
2010
IEEE
14 years 7 months ago
Patch-Based Similarity HMMs for Face Recognition with a Single Reference Image
In this paper we present a new architecture for face recognition with a single reference image, which completely separates the training process from the recognition process. In th...
Ngoc-Son Vu, Alice Caplier
IMC
2010
ACM
14 years 7 months ago
Performance comparison of 3G and metro-scale WiFi for vehicular network access
We perform a head-to-head comparison of the performance characteristics of a 3G network operated by a nation-wide provider and a metro-scale WiFi network operated by a commercial ...
Pralhad Deshpande, Xiaoxiao Hou, Samir R. Das
IMC
2010
ACM
14 years 7 months ago
Eyeball ASes: from geography to connectivity
This paper presents a new approach to determine the geographical footprint of individual Autonomous Systems that directly provide service to end-users, i.e.,eyeball ASes. The key ...
Amir H. Rasti, Nazanin Magharei, Reza Rejaie, Walt...
IMC
2010
ACM
14 years 7 months ago
The effect of packet loss on redundancy elimination in cellular wireless networks
Network-level redundancy elimination (RE) algorithms reduce traffic volume on bandwidth-constrained network paths by avoiding the transmission of repeated byte sequences. Previous...
Cristian Lumezanu, Katherine Guo, Neil Spring, Bob...
« Prev « First page 2398 / 2405 Last » Next »