Sciweavers

1938 search results - page 313 / 388
» Extending Conceptual Models for Web Based Applications
Sort
View
IPPS
1999
IEEE
14 years 3 days ago
An Adaptive, Fault-Tolerant Implementation of BSP for JAVA-Based Volunteer Computing Systems
Abstract. In recent years, there has been a surge of interest in Javabased volunteer computing systems, which aim to make it possible to build very large parallel computing network...
Luis F. G. Sarmenta
NCA
2003
IEEE
14 years 1 months ago
Performance Analysis of an Application-level Cooperative Control Protocol
This paper proposes the modeling and the performance analysis of a high-level control protocol – COCOP, which enables cooperative groups of clients to control a shared server de...
Giancarlo Fortino, Carlo Mastroianni, Wilma Russo
ECCV
2004
Springer
14 years 9 months ago
Detecting Keypoints with Stable Position, Orientation, and Scale under Illumination Changes
Local feature approaches to vision geometry and object recognition are based on selecting and matching sparse sets of visually salient image points, known as `keypoints' or `p...
Bill Triggs
CDC
2008
IEEE
204views Control Systems» more  CDC 2008»
14 years 2 months ago
Dynamic ping optimization for surveillance in multistatic sonar buoy networks with energy constraints
— In this paper we study the problem of dynamic optimization of ping schedule in an active sonar buoy network deployed to provide persistent surveillance of a littoral area throu...
Anshu Saksena, I-Jeng Wang
PKC
2007
Springer
129views Cryptology» more  PKC 2007»
14 years 1 months ago
Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles
We provide a positive result about the Fiat-Shamir (FS) transform in the standard model, showing how to use it to convert threemove identification protocols into two-tier signatur...
Mihir Bellare, Sarah Shoup