Sciweavers

532 search results - page 42 / 107
» Extending Scalar Multiplication Using Double Bases
Sort
View
ICASSP
2010
IEEE
13 years 9 months ago
Removing illumination artifacts from face images using the nuisance attribute projection
Illumination induced appearance changes represent one of the open challenges in automated face recognition systems still significantly influencing their performance. Several tec...
Vitomir Struc, Bostjan Vesnicer, France Mihelic, N...
INFOCOM
2003
IEEE
14 years 2 months ago
Design of Light-Tree Based Logical Topologies for Multicast Streams in Wavelength Routed Optical Networks
—In this paper, we formulate an optimization problem for the design of light-tree based logical topology in Wavelength Division Multiplexing (WDM) networks. The problem is compri...
Wanjiun Liao
CLUSTER
2004
IEEE
13 years 8 months ago
Seamless Access to Decentralized Storage Services in Computational Grids via a Virtual File System
This paper describes a novel technique for establishing a virtual file system that allows data to be transferred user-transparently and on-demand across computing and storage serve...
Renato J. O. Figueiredo, Nirav H. Kapadia, Jos&eac...
AGENTS
2000
Springer
14 years 1 months ago
Adaptive Trust and Co-operation: An Agent-Based Simulation Approach
This paper extends earlier work in the use of ‘Agent-based Computational Economics’ (ACE) for modelling the development of co-operation between firms. Inter-firm relations hav...
Bart Nooteboom, Tomas Klos, René J. Jorna
EDOC
1997
IEEE
14 years 29 days ago
A Policy Based Role Object Model
Enterprise roles define the duties and responsibilities of the individuals which are assigned to them. This paper introduces a framework for the management of large distributed sy...
Emil Lupu, Morris Sloman