Sciweavers

139 search results - page 24 / 28
» Achieving Co-allocation through Virtualization in Grid Envir...
Sort
View
VLDB
2010
ACM
190views Database» more  VLDB 2010»
13 years 9 months ago
Continuous authentication on relational streams
According to the database outsourcing model, a data owner delegates database functionality to a thirdparty service provider, which answers queries received from clients. Authentic...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias
AAI
1999
125views more  AAI 1999»
13 years 10 months ago
Deictic Believability: Coordinated Gesture, Locomotion, and Speech in Lifelike Pedagogical Agents
Lifelike animated agents for knowledge-based learning environments can provide timely, customized advice to support students' problem solving. Because of their strong visual ...
James C. Lester, Jennifer L. Voerman, Stuart G. To...
CG
1999
Springer
13 years 10 months ago
A visibility algorithm for hybrid geometry- and image-based modeling and rendering
Hybrid geometry- and image-based modeling and rendering systems use photographs taken of a real-world environment and mapped onto the surfaces of a 3D model to achieve photorealis...
Thomas A. Funkhouser
SEMWEB
2004
Springer
14 years 4 months ago
Semantic Web Service Interaction Protocols: An Ontological Approach
A central requirement for achieving the vision of run-time discovery and dynamic composition of services is the provision of appropriate descriptions of the operation of a service,...
Ronald Ashri, Grit Denker, Darren Marvin, Mike Sur...
ICDS
2009
IEEE
14 years 5 months ago
Self Protecting Data for De-perimeterised Information Sharing
- The emergence of high-speed networks, Grid Computing, Service-Oriented Architectures, and an ever increasing ambient connection to mobile Internet has enabled an underpinning inf...
Pete Burnap, Jeremy Hilton