Sciweavers

583 search results - page 19 / 117
» Computing Linking Numbers of a Filtration
Sort
View
CCS
2004
ACM
14 years 3 months ago
Verifying policy-based security for web services
WS-SecurityPolicy is a declarative configuration language for driving web services security mechanisms. We describe a formal sefor WS-SecurityPolicy, and propose a more abstract ...
Karthikeyan Bhargavan, Cédric Fournet, Andr...
OTM
2009
Springer
14 years 4 months ago
CLON: Overlay Networks and Gossip Protocols for Cloud Environments
Although epidemic or gossip-based multicast is a robust and scalable approach to reliable data dissemination, its inherent redundancy results in high resource consumption on both ...
Miguel Matos, António Sousa, José Pe...
ASSETS
2000
ACM
14 years 2 months ago
A comparison of voice controlled and mouse controlled web browsing
Voice controlled web browsers allow users to navigate by speaking the text of a link or an associated number instead of clicking with a mouse. One such browser is Conversa, by Con...
Kevin Christian, Bill Kules, Ben Shneiderman, Adel...
CVPR
2005
IEEE
14 years 12 months ago
A Factorization-Based Approach to Articulated Motion Recovery
This paper addresses the subspace properties and the recovery of articulated motion. We point out that the global motion subspace of an articulated object is a combination of a nu...
Jingyu Yan, Marc Pollefeys
PDP
2005
IEEE
14 years 3 months ago
Practicable Layouts for Optimal Circulant Graphs
Circulant graphs have been deeply studied in technical literature. Midimew networks are a class of distancerelated optimal circulant graphs of degree four which have applications ...
Enrique Vallejo, Ramón Beivide, Carmen Mart...