Sciweavers

1663 search results - page 239 / 333
» Computer Security in the Real World
Sort
View
MP
2002
110views more  MP 2002»
15 years 3 months ago
Robust optimization - methodology and applications
Abstract. Robust Optimization (RO) is a modeling methodology, combined with computational tools, to process optimization problems in which the data are uncertain and is only known ...
Aharon Ben-Tal, Arkadi Nemirovski
NGC
2002
Springer
15 years 3 months ago
Supporting Cross-Cultural Communication with a Large-Screen System
Abstract As opportunities for international collaboration and crosscultural communication among people from heterogeneous cultures increase, the importance of electronic communicat...
Masayuki Okamoto, Katherine Isbister, Hideyuki Nak...
137
Voted
MVA
2007
158views Computer Vision» more  MVA 2007»
15 years 3 months ago
Hybrid object labelling in digital images
The application of a technique for labelling connected components based on the classical recursive technique is studied. The recursive approach permits labelling, counting, and cha...
Julio Martín-Herrero
PERCOM
2010
ACM
15 years 2 months ago
encDPWS - message encoding of SOAP Web Services
—Current efforts in real world deployment of wireless sensor networks end up in the development of the 6LoWPAN protocols. While big industrial consortia develop new technologies,...
Guido Moritz, Dirk Timmermann, Regina Stoll, Frank...
BIRTHDAY
2010
Springer
15 years 2 months ago
A Logistics Workload for Event Notification Middleware
The event-based paradigm plays an important role to reflect logistics processes in modern IT infrastructures. Events occur at many stages, e.g., when goods tagged with RFID chips a...
Stefan Appel, Kai Sachs