Sciweavers

1715 search results - page 203 / 343
» Trust and Reputation Systems
Sort
View
CAIP
2003
Springer
244views Image Analysis» more  CAIP 2003»
15 years 3 months ago
Real-Time Optic Flow Computation with Variational Methods
Abstract. Variational methods for optic flow computation have the reputation of producing good results at the expense of being too slow for real-time applications. We show that re...
Andrés Bruhn, Joachim Weickert, Christian F...
IMECS
2007
14 years 11 months ago
On Extendable Software Architecture for Spam Email Filtering
—The research community and the IT industry have invested significant effort in fighting spam emails. There are many different approaches, ranging from white listing, black listi...
Wanli Ma, Dat Tran, Dharmendra Sharma
ADHOC
2007
133views more  ADHOC 2007»
14 years 10 months ago
Secure position-based routing protocol for mobile ad hoc networks
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
GRID
2006
Springer
14 years 10 months ago
A Parallel Approach to XML Parsing
A language for semi-structured documents, XML has emerged as the core of the web services architecture, and is playing crucial roles in messaging systems, databases, and document p...
Wei Lu, Kenneth Chiu, Yinfei Pan
TON
2008
121views more  TON 2008»
14 years 10 months ago
A framework for mitigating attacks against measurement-based adaptation mechanisms in unstructured multicast overlay networks
Many multicast overlay networks maintain application-specific performance goals by dynamically adapting the overlay structure when the monitored performance becomes inadequate. Thi...
Aaron Walters, David Zage, Cristina Nita-Rotaru