Sciweavers

2093 search results - page 312 / 419
» Business Process Modelling and Purpose Analysis for Requirem...
Sort
View
CCS
2001
ACM
14 years 20 days ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
CSMR
2004
IEEE
13 years 12 months ago
Supporting Architectural Restructuring by Analyzing Feature Models
In order to lower the risk, reengineering projects aim at high reuse rates. Therefore, tasks like architectural restructuring have to be performed in a way that developed new syst...
Ilian Pashov, Matthias Riebisch, Ilka Philippow
DAS
2008
Springer
13 years 10 months ago
Handling of Surface Modifications for Robust Image Based Mail Piece Comparison
Image based mail piece identification is a new technology for optimizing the postal sorting process. Exploiting the mail piece surface uniqueness, characteristic features are used...
Katja Worm, Beate Meffert
ECCV
2010
Springer
14 years 1 months ago
Gaussian-like Spatial Priors for Articulated Tracking
We present an analysis of the spatial covariance structure of an articulated motion prior in which joint angles have a known covariance structure. From this, a well-known, but ofte...
ICC
2008
IEEE
146views Communications» more  ICC 2008»
14 years 2 months ago
APOS: Adaptive Parameters Optimization Scheme for Voice over IEEE 802.11g
—In this paper we present APOS, a method for dynamically adapting the parameters of IEEE 802.11g to the estimated system state, with the aim of enhancing the quality of a voice c...
Nicola Baldo, Federico Maguolo, Simone Merlin, And...