Sciweavers

25156 search results - page 4936 / 5032
» Applications for conscious systems
Sort
View
DIAL
2004
IEEE
138views Image Analysis» more  DIAL 2004»
14 years 24 days ago
Retrieving Imaged Documents in Digital Libraries Based on Word Image Coding
A great number of documents are scanned and archived in the form of digital images in digital libraries, to make them available and accessible in the Internet. Information retriev...
Yue Lu, Li Zhang, Chew Lim Tan
CCS
2006
ACM
14 years 24 days ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...
CCS
2006
ACM
14 years 24 days ago
TCG inside?: a note on TPM specification compliance
The Trusted Computing Group (TCG) has addressed a new generation of computing platforms employing both supplemental hardware and software with the primary goal to improve the secu...
Ahmad-Reza Sadeghi, Marcel Selhorst, Christian St&...
FOCS
2004
IEEE
14 years 24 days ago
On the Streaming Model Augmented with a Sorting Primitive
The need to deal with massive data sets in many practical applications has led to a growing interest in computational models appropriate for large inputs. The most important quali...
Gagan Aggarwal, Mayur Datar, Sridhar Rajagopalan, ...
COMSWARE
2006
IEEE
14 years 24 days ago
Architecting protocol stack optimizations on mobile devices
Applications using traditional protocol stacks (e.g TCP/IP) from wired networks do not function efficiently in mobile wireless scenarios. This is primarily due to the layered archi...
Vijay T. Raisinghani, Sridhar Iyer
« Prev « First page 4936 / 5032 Last » Next »