Sciweavers

250 search results - page 43 / 50
» Automatically constructing trusted cluster computing environ...
Sort
View
ICRA
2009
IEEE
164views Robotics» more  ICRA 2009»
14 years 1 months ago
Assigning cameras to subjects in video surveillance systems
— We consider the problem of tracking multiple agents moving amongst obstacles, using multiple cameras. Given an environment with obstacles, and many people moving through it, we...
Hazem El-Alfy, David Jacobs, Larry Davis
DEBS
2010
ACM
13 years 7 months ago
Providing basic security mechanisms in broker-less publish/subscribe systems
The provisioning of basic security mechanisms such as authentication and confidentiality is highly challenging in a content-based publish/subscribe system. Authentication of publi...
Muhammad Adnan Tariq, Boris Koldehofe, Ala' Altawe...
SACMAT
2009
ACM
14 years 1 months ago
Working set-based access control for network file systems
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
Stephen Smaldone, Vinod Ganapathy, Liviu Iftode
CVPR
2009
IEEE
15 years 1 months ago
Learning Semantic Visual Vocabularies Using Diffusion Distance
In this paper, we propose a novel approach for learning generic visual vocabulary. We use diffusion maps to au-tomatically learn a semantic visual vocabulary from ab-undant quantiz...
Jingen Liu (University of Central Florida), Yang Y...
CCGRID
2006
IEEE
14 years 23 days ago
Component-Based Modeling, Analysis and Animation
Component-based software construction is widely used in a variety of applications, from embedded environments to grid computing. However, errors in these applications and systems ...
Jeff Kramer