Sciweavers

9166 search results - page 1772 / 1834
» A framework for comparing models of computation
Sort
View
ICIAR
2005
Springer
15 years 9 months ago
Real-Time and Robust Background Updating for Video Surveillance and Monitoring
Abstract. Background updating is an important aspect of dynamic scene analysis. Two critical problems: sudden camera perturbation and the sleeping person problem, which arise frequ...
Xingzhi Luo, Suchendra M. Bhandarkar
P2P
2003
IEEE
110views Communications» more  P2P 2003»
15 years 9 months ago
The Effectiveness of Realistic Replication Strategies on Quality of Availability for Peer-to-Peer Systems
In this paper, we take an availability-centric view on quality of service (QoS) and propose a model and mechanisms for studying the effectiveness of realistic replication schemes ...
Giwon On, Jens Schmitt, Ralf Steinmetz
WPES
2003
ACM
15 years 9 months ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
IWDC
2001
Springer
140views Communications» more  IWDC 2001»
15 years 8 months ago
Satellite Systems Performance with TCP-IP Applications
Mobile Internet access is becoming extremely popular because users depend on the Internet for many activities in their daily routine. Satellites are well suited for mobile Interne...
Pierpaolo Loreti, Michele Luglio, Rohit Kapoor, J....
VLDB
2001
ACM
190views Database» more  VLDB 2001»
15 years 8 months ago
LEO - DB2's LEarning Optimizer
Most modern DBMS optimizers rely upon a cost model to choose the best query execution plan (QEP) for any given query. Cost estimates are heavily dependent upon the optimizer’s e...
Michael Stillger, Guy M. Lohman, Volker Markl, Mok...
« Prev « First page 1772 / 1834 Last » Next »