In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deļ¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
Learning the userās semantics for CBIR involves two diļ¬erent sources of information: the similarity relations entailed by the content-based features, and the relevance relatio...
Although time-domain oversampling of the received baseband signal is common for single-carrier transmissions, the counterpart of frequency-domain oversampling is rarely used for mu...
Zhaohui Wang, Shengli Zhou, Georgios B. Giannakis,...
To date, systems offering multitasking for the JavaTM programming language either use one process or one class loader for each application. Both approaches are unsatisfactory. Usi...
High-performance computing faces considerable change as the Internet and the Grid mature. Applications that once were tightly-coupled and monolithic are now decentralized, with co...
Patrick Widener, Greg Eisenhauer, Karsten Schwan, ...