Sciweavers

2061 search results - page 317 / 413
» Authorization for Metacomputing Applications
Sort
View
144
Voted
DLT
2006
15 years 5 months ago
Closure of Language Classes Under Bounded Duplication
Duplication is an operation generating a language from a single word by iterated application of rewriting rules u uu on factors. We extend this operation to entire languages and i...
Masami Ito, Peter Leupold, Kayoko Shikishima-Tsuji
157
Voted
SPLC
2000
15 years 5 months ago
Two Novel Concepts for systematic product line development
: Framelets and implementation cases are new concepts to manage the complexity of product line development. Framelets are "small product lines" that address, as self-stan...
Alessandro Pasetti, Wolfgang Pree
ECCV
2010
Springer
15 years 5 months ago
Image Invariants for Smooth Reflective Surfaces
Image invariants are those properties of the images of an object that remain unchanged with change in camera parameters, illumination etc. In this paper, we derive an image invari...
119
Voted
CN
2010
95views more  CN 2010»
15 years 4 months ago
Loop-free alternates and not-via addresses: A proper combination for IP fast reroute?
The IETF currently discusses fast reroute mechanisms for IP networks (IP FRR). IP FRR accelerates the recovery in case of network element failures and avoids micro-loops during re...
Michael Menth, Matthias Hartmann, Rüdiger Mar...
115
Voted
GRID
2006
Springer
15 years 4 months ago
Toward an On-Demand Restricted Delegation Mechanism for Grids
Grids are intended to enable cross-organizational interactions which makes Grid security a challenging and nontrivial issue. In Grids, delegation is a key facility that can be used...
Mehran Ahsant, Jim Basney, Olle Mulmo, Adam J. Lee...