Sciweavers

583 search results - page 19 / 117
» Computing Linking Numbers of a Filtration
Sort
View
96
Voted
CCS
2004
ACM
15 years 8 months ago
Verifying policy-based security for web services
WS-SecurityPolicy is a declarative configuration language for driving web services security mechanisms. We describe a formal sefor WS-SecurityPolicy, and propose a more abstract ...
Karthikeyan Bhargavan, Cédric Fournet, Andr...
102
Voted
OTM
2009
Springer
15 years 9 months ago
CLON: Overlay Networks and Gossip Protocols for Cloud Environments
Although epidemic or gossip-based multicast is a robust and scalable approach to reliable data dissemination, its inherent redundancy results in high resource consumption on both ...
Miguel Matos, António Sousa, José Pe...
128
Voted
ASSETS
2000
ACM
15 years 7 months ago
A comparison of voice controlled and mouse controlled web browsing
Voice controlled web browsers allow users to navigate by speaking the text of a link or an associated number instead of clicking with a mouse. One such browser is Conversa, by Con...
Kevin Christian, Bill Kules, Ben Shneiderman, Adel...
125
Voted
CVPR
2005
IEEE
16 years 4 months ago
A Factorization-Based Approach to Articulated Motion Recovery
This paper addresses the subspace properties and the recovery of articulated motion. We point out that the global motion subspace of an articulated object is a combination of a nu...
Jingyu Yan, Marc Pollefeys
PDP
2005
IEEE
15 years 8 months ago
Practicable Layouts for Optimal Circulant Graphs
Circulant graphs have been deeply studied in technical literature. Midimew networks are a class of distancerelated optimal circulant graphs of degree four which have applications ...
Enrique Vallejo, Ramón Beivide, Carmen Mart...