Sciweavers

7762 search results - page 1538 / 1553
» Availability in BitTorrent Systems
Sort
View
OOPSLA
2010
Springer
13 years 8 months ago
Concurrency by modularity: design patterns, a case in point
General purpose object-oriented programs typically aren’t embarrassingly parallel. For these applications, finding enough concurrency remains a challenge in program design. To ...
Hridesh Rajan, Steven M. Kautz, Wayne Rowcliffe
PAMI
2010
168views more  PAMI 2010»
13 years 8 months ago
Surface-from-Gradients without Discrete Integrability Enforcement: A Gaussian Kernel Approach
—Representative surface reconstruction algorithms taking a gradient field as input enforces the integrability constraint in a discrete manner. While enforcing integrability allo...
Heung-Sun Ng, Tai-Pang Wu, Chi-Keung Tang
PKDD
2010
Springer
188views Data Mining» more  PKDD 2010»
13 years 8 months ago
Semi-supervised Abstraction-Augmented String Kernel for Multi-level Bio-Relation Extraction
ervised Abstraction-Augmented String Kernel for Multi-Level Bio-Relation Extraction Pavel Kuksa1 , Yanjun Qi2 , Bing Bai2 , Ronan Collobert2 , Jason Weston3 , Vladimir Pavlovic1 , ...
Pavel P. Kuksa, Yanjun Qi, Bing Bai, Ronan Collobe...
TDSC
2010
218views more  TDSC 2010»
13 years 8 months ago
Secure Data Objects Replication in Data Grid
—Secret sharing and erasure coding-based approaches have been used in distributed storage systems to ensure the confidentiality, integrity, and availability of critical informati...
Manghui Tu, Peng Li, I-Ling Yen, Bhavani M. Thurai...
TIFS
2010
173views more  TIFS 2010»
13 years 8 months ago
A hybrid approach for generating secure and discriminating face template
Abstract—Biometric template protection is one of the most important issues in deploying a practical biometric system. To tackle this problem, many algorithms, that do not store t...
Yi C. Feng, Pong C. Yuen, Anil K. Jain
« Prev « First page 1538 / 1553 Last » Next »