Sciweavers

823 search results - page 129 / 165
» Distributed Cipher Services Using Object Activation
Sort
View
FGR
2004
IEEE
170views Biometrics» more  FGR 2004»
13 years 11 months ago
3D Shape Constraint for Facial Feature Localization Using Probabilistic-like Output
This paper presents a method to automatically locate facial feature points under large variations in pose, illumination and facial expressions. First we propose a method to calcul...
Longbin Chen, Lei Zhang, HongJiang Zhang, Mohamed ...
DGO
2007
150views Education» more  DGO 2007»
13 years 9 months ago
Event-triggered data and knowledge sharing among collaborating government organizations
Solving complex global problems such as illegal immigration, border control, and terrorism requires government organizations at all levels to share not only data but, more importa...
Seema Degwekar, Jeff DePree, Howard W. Beck, Carla...
HPCC
2011
Springer
12 years 7 months ago
Achieving Performance and Availability Guarantees with Spot Instances
Abstract—In the Infrastructure-as-a-Service (IaaS) cloud computing market, spot instances refer to virtual servers that are rented via an auction. Spot instances allow IaaS provi...
Michele Mazzucco, Marlon Dumas
RULEML
2007
Springer
14 years 2 months ago
The OO jDREW Engine of Rule Responder: Naf Hornlog RuleML Query Answering
Abstract. Rule Responder is an intelligent multi-agent system for collaborative teams and virtual communities that uses RuleML as its rule interchange format. The system allows the...
Benjamin Larry Craig
MTA
2000
145views more  MTA 2000»
13 years 7 months ago
Adaptive Multimedia Presentation Strategies
Multimedia presentations comprise various media objects such as text, audio, image, and video that are delivered to users according to certain temporal relationships. In stored mul...
B. Prabhakaran