Sciweavers

835 search results - page 127 / 167
» A calculus of challenges and responses
Sort
View
PR
2008
218views more  PR 2008»
13 years 9 months ago
Automatic feature localisation with constrained local models
We present an efficient and robust method of locating a set of feature points in an object of interest. From a training set we construct a joint model of the appearance of each fe...
David Cristinacce, Timothy F. Cootes
COMPSEC
2004
131views more  COMPSEC 2004»
13 years 8 months ago
Biometric random number generators
Abstract Up to now biometric methods have been used in cryptography for authentication purposes. In this paper we propose to use biological data for generating sequences of random ...
Janusz Szczepanski, Elek Wajnryb, José M. A...
TSE
1998
116views more  TSE 1998»
13 years 8 months ago
A Framework-Based Approach to the Development of Network-Aware Applications
— Modern networks provide a QoS (quality of service) model to go beyond best-effort services, but current QoS models are oriented towards low-level network parameters (e.g., band...
Jürg Bolliger, Thomas R. Gross
SIGOPS
2008
170views more  SIGOPS 2008»
13 years 8 months ago
I/O resource management through system call scheduling
A principal challenge in operating system design is controlling system throughput and responsiveness while maximizing resource utilization. Unlike previous attempts in kernel reso...
Silviu S. Craciunas, Christoph M. Kirsch, Harald R...
ISF
2010
109views more  ISF 2010»
13 years 7 months ago
Collaborative systems development in disaster relief: The impact of multi-level governance
Disaster management information systems for international humanitarian relief are developed in contexts involving local, national and inter-governmental organizations together with...
Edgar A. Maldonado, Carleen F. Maitland, Andrea Ho...