Sciweavers

1252 search results - page 96 / 251
» Foundations of Similarity and Utility
Sort
View
IPPS
2007
IEEE
14 years 3 months ago
Securing Grid Data Transfer Services with Active Network Portals
Widely available and utilized Grid servers are vulnerable to a variety of threats from Denial of Service (DoS) attacks, overloading caused by flash crowds, and compromised client ...
Onur Demir, Michael R. Head, Kanad Ghose, Madhusud...
IROS
2007
IEEE
164views Robotics» more  IROS 2007»
14 years 3 months ago
Emulation and behavior understanding through shared values
— Neurophysiology has revealed the existence of mirror neurons in brain of macaque monkeys and they shows similar activities during executing an observation of goal directed move...
Yasutake Takahashi, Teruyasu Kawamata, Minoru Asad...
MMM
2007
Springer
119views Multimedia» more  MMM 2007»
14 years 3 months ago
Coopetitive Multimedia Surveillance
‘Coopetitive’ interaction strategy has been shown to give better results than similar strategies like ‘only cooperation’, ‘only competition’ etc [7]. However, this has ...
Vivek K. Singh, Pradeep K. Atrey, Mohan S. Kankanh...
DEEC
2006
IEEE
14 years 3 months ago
BestChoice: A Decision Support System for Supplier Selection in e-Marketplaces
A growing number of companies are outsourcing their purchasing processes to independent purchasing agencies. These agencies now have to process an ever increasing number of purchas...
Dongjoo Lee, Taehee Lee, Suekyung Lee, Ok-Ran Jeon...
IROS
2006
IEEE
104views Robotics» more  IROS 2006»
14 years 3 months ago
Resource Management with RFID Technology in Automatic Warehouse System
— Warehouse operation has become a critical activity in supply chain to outperform competitors on customer service, lead times and costs. However, managers often meet difficulti...
Guidong Liu, Wensheng Yu, Yu Liu