Sciweavers

1998 search results - page 381 / 400
» A Hardware Implementation of PRAM and Its Performance Evalua...
Sort
View
JIPS
2007
223views more  JIPS 2007»
13 years 9 months ago
Addressing Mobile Agent Security through Agent Collaboration
: The use of agent paradigm in today’s applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execut...
Evens Jean, Yu Jiao, Ali R. Hurson
ICDM
2010
IEEE
125views Data Mining» more  ICDM 2010»
13 years 7 months ago
Topic Modeling Ensembles
: Topic Modeling Ensembles Zhiyong Shen, Ping Luo, Shengwen Yang, Xukun Shen HP Laboratories HPL-2010-158 Topic model, Ensemble In this paper we propose a framework of topic model...
Zhiyong Shen, Ping Luo, Shengwen Yang, Xukun Shen
ECCV
2008
Springer
14 years 11 months ago
Simultaneous Detection and Registration for Ileo-Cecal Valve Detection in 3D CT Colonography
Object detection and recognition has achieved a significant progress in recent years. However robust 3D object detection and segmentation in noisy 3D data volumes remains a challen...
Le Lu, Adrian Barbu, Matthias Wolf, Jianming Liang...
IPPS
2007
IEEE
14 years 3 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...
IPSN
2005
Springer
14 years 2 months ago
Design considerations for solar energy harvesting wireless embedded systems
Abstract— Sustainable operation of battery powered wireless embedded systems (such as sensor nodes) is a key challenge, and considerable research effort has been devoted to energ...
Vijay Raghunathan, Aman Kansal, Jason Hsu, Jonatha...