Sciweavers

3467 search results - page 668 / 694
» A New Localized Network Based Routing Model in Computer and ...
Sort
View
NCA
2003
IEEE
14 years 27 days ago
Web Proxy Cache Replacement: Do's, Don'ts, and Expectations
Numerous research efforts have produced a large number of algorithms and mechanisms for web proxy caches. In order to build powerful web proxies and understand their performance, ...
Peter Triantafillou, Ioannis Aekaterinidis
SACMAT
2004
ACM
14 years 1 months ago
Using trust and risk in role-based access control policies
Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their ...
Nathan Dimmock, András Belokosztolszki, Dav...
DPD
2002
125views more  DPD 2002»
13 years 7 months ago
Parallel Mining of Outliers in Large Database
Data mining is a new, important and fast growing database application. Outlier (exception) detection is one kind of data mining, which can be applied in a variety of areas like mon...
Edward Hung, David Wai-Lok Cheung
IJCV
2002
143views more  IJCV 2002»
13 years 7 months ago
Trinocular Stereo: A Real-Time Algorithm and its Evaluation
In telepresence applications each user is immersed in a rendered 3D-world composed from representations transmitted from remote sites. The challenge is to compute dense range data...
Jane Mulligan, Volkan Isler, Konstantinos Daniilid...
AI
2008
Springer
13 years 9 months ago
A Novel Approach for Social Behavior Analysis of the Blogosphere
The web, as a real mass medium, has become an invaluable data source for Information Extraction and Retrieval systems. Digital authoring is a relatively new style of communication,...
Reza Zafarani, Mohammad-Amin Jashki, Hamidreza Bag...