Sciweavers

250 search results - page 27 / 50
» Automatically constructing trusted cluster computing environ...
Sort
View
SPIEVIP
2010
13 years 9 months ago
Automatic scene activity modeling for improving object classification
In video surveillance, automatic methods for scene understanding and activity modeling can exploit the high redundancy of object trajectories observed over a long period of time. ...
Samuel Foucher, Marc Lalonde, Langis Gagnon
ASE
2004
137views more  ASE 2004»
13 years 7 months ago
Automatically Restructuring Programs for the Web
The construction of interactive server-side Web applications differs substantially from the construction of traditional interactive programs. In contrast, existing Web programming...
Jacob Matthews, Robert Bruce Findler, Paul T. Grau...
AINA
2008
IEEE
14 years 1 months ago
VR BBS Using Immersive Virtual Environment
In this research, VR BBS was developed. In this system, a user can post a photograph with a comment from cellular phone. And the users can see and reply to the photograph and comm...
Satoshi Oonuki, Tetsuro Ogi
SIGECOM
2005
ACM
113views ECommerce» more  SIGECOM 2005»
14 years 29 days ago
Dynamic and secure B2B e-contract update management
Business-to-business electronic contracts provide a specification of the agreed value exchange and guarantee legal protection to companies during electronic trading relations. Imp...
Samuil Angelov, Sven Till, Paul W. P. J. Grefen
CCS
2010
ACM
13 years 5 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...