Sciweavers

581 search results - page 98 / 117
» A Rewriting Based Model for Probabilistic Distributed Object...
Sort
View
CSREASAM
2006
13 years 9 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
MIDDLEWARE
2007
Springer
14 years 1 months ago
Vector-Field Consistency for Ad-Hoc Gaming
Abstract. Developing distributed multiplayer games for ad-hoc networks is challenging. Consistency of the replicated shared state is hard to ensure at a low cost. Current consisten...
Nuno Santos, Luís Veiga, Paulo Ferreira
HT
2010
ACM
13 years 9 months ago
Capturing implicit user influence in online social sharing
Online social sharing sites are becoming very popular nowadays among Web users, who use these sites to share their favourite items and to discover interesting and useful items fro...
Ching-man Au Yeung, Tomoharu Iwata
IWINAC
2011
Springer
12 years 10 months ago
Clustering of Trajectories in Video Surveillance Using Growing Neural Gas
Abstract. One of the more important issues in intelligent video surveillance systems is the ability to handle events from the motion of objects. Thus, the classification of the tr...
Javier Acevedo-Rodríguez, Saturnino Maldona...
SMARTNET
2000
13 years 9 months ago
Software Agent Constrained Mobility for Network Performance Monitoring
During the recent years of research on mobile agents, significant effort has been directed towards the identification of models of agent mobility suitable for network management a...
Christos Bohoris, Antonio Liotta, George Pavlou