Sciweavers

1663 search results - page 231 / 333
» Computer Security in the Real World
Sort
View
EMSOFT
2005
Springer
15 years 9 months ago
Semantics-based optimization across uncoordinated tasks in networked embedded systems
Microservers are networked embedded devices that accept user tasks on demand and execute them on real world information collected by sensors. Sharing intermediate sensing and comp...
Jie Liu, Elaine Cheong, Feng Zhao
INTETAIN
2005
Springer
15 years 9 months ago
Telepresence Techniques for Controlling Avatar Motion in First Person Games
First person games are computer games, in which the user experiences the virtual game world from an avatar’s view. This avatar is the user’s alter ego in the game. In this pape...
Henning Groenda, Fabian Nowak, Patrick Rö&szl...
DOLAP
2004
ACM
15 years 9 months ago
PrefixCube: prefix-sharing condensed data cube
BST Condensed Cube is a fully computed cube that condenses those tuples, which are aggregated from the same single base relation tuple, into one physical tuple. Although it has be...
Jianlin Feng, Qiong Fang, Hulin Ding
ICCV
2003
IEEE
15 years 9 months ago
Tracking Across Multiple Cameras With Disjoint Views
Conventional tracking approaches assume proximity in space, time and appearance of objects in successive observations. However, observations of objects are often widely separated ...
Omar Javed, Zeeshan Rasheed, Khurram Shafique, Mub...
PDP
2003
IEEE
15 years 9 months ago
Dissipative Cellular Automata As Minimalist Distributed Systems: A Study On Emergent Behaviors
This paper describes the behavior observed in a class of cellular automata that we have defined as "dissipative", i.e., cellular automata for which the external environm...
Marco Mamei, Andrea Roli, Franco Zambonelli