Sciweavers

7839 search results - page 289 / 1568
» What's there and what's not
Sort
View
WMPI
2004
ACM
15 years 7 months ago
An analytical model for software-only main memory compression
Abstract. Many applications with large data spaces that cannot run on a typical workstation (due to page faults) call for techniques to expand the effective memory size. One such t...
Irina Chihaia, Thomas R. Gross
IJCAI
1997
15 years 3 months ago
An Achievement Test for Knowledge-Based Systems: QUEM
This paper describes QUEM, a method for assessing the skill level of a knowledge-based system based on the quality of the solutions it produces. QUEM is demonstrated by using it t...
Caroline C. Hayes, Michael I. Parzen
SCIA
2009
Springer
146views Image Analysis» more  SCIA 2009»
15 years 8 months ago
Extraction of Windows in Facade Using Kernel on Graph of Contours
In the past few years, street-level geoviewers has become a very popular web-application. In this paper, we focus on a first urban concept which has been identified as useful for...
Jean-Emmanuel Haugeard, Sylvie Philipp-Foliguet, F...
108
Voted
ICC
2007
IEEE
114views Communications» more  ICC 2007»
15 years 8 months ago
Two-Factor Localized Authentication Scheme for WLAN Roaming
- In the paper, we propose an efficient two-factor localized authentication scheme suitable for WLAN roaming. The proposed authentication scheme can greatly improve the security co...
Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen
PET
2007
Springer
15 years 7 months ago
Enforcing P3P Policies Using a Digital Rights Management System
The protection of privacy has gained considerable attention recently. In response to this, new privacy protection systems are being introduced. SITDRM is one such system that prote...
Farzad Salim, Nicholas Paul Sheppard, Reihaneh Saf...