Sciweavers

1605 search results - page 320 / 321
» An XML implementation process model for enterprise applicati...
Sort
View
ISMAR
2009
IEEE
14 years 2 months ago
Dynamic seethroughs: Synthesizing hidden views of moving objects
This paper presents a method to create an illusion of seeing moving objects through occluding surfaces in a video. This illusion is achieved by transferring information from a cam...
Peter Barnum, Yaser Sheikh, Ankur Datta, Takeo Kan...
IPPS
2007
IEEE
14 years 1 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...
PPPJ
2006
ACM
14 years 1 months ago
Juxta-Cat: a JXTA-based platform for distributed computing
In this paper we present a JXTA-based platform, called Juxta-CAT, which is an effort to use the JXTA architecture to build a job execution-sharing distributed environment. The Ju...
Joan Esteve Riasol, Fatos Xhafa
ASPDAC
2005
ACM
113views Hardware» more  ASPDAC 2005»
14 years 1 months ago
Scalable interprocedural register allocation for high level synthesis
Abstract— The success of classical high level synthesis has been limited by the complexity of the applications it can handle, typically not large enough to necessitate the depart...
Rami Beidas, Jianwen Zhu
ICDM
2003
IEEE
92views Data Mining» more  ICDM 2003»
14 years 25 days ago
Validating and Refining Clusters via Visual Rendering
Clustering is an important technique for understanding and analysis of large multi-dimensional datasets in many scientific applications. Most of clustering research to date has be...
Keke Chen, Ling Liu