Sciweavers

72 search results - page 9 / 15
» Handling Identity in Peer-to-Peer Systems
Sort
View
HOTOS
2007
IEEE
14 years 1 months ago
Hyperspaces for Object Clustering and Approximate Matching in Peer-to-Peer Overlays
Existing distributed hash tables provide efficient mechanisms for storing and retrieving a data item based on an exact key, but are unsuitable when the search key is similar, but ...
Bernard Wong, Ymir Vigfusson, Emin Gün Sirer
ICDE
2007
IEEE
176views Database» more  ICDE 2007»
14 years 4 months ago
Finding Important People in Large News Video Databases Using Multimodal and Clustering Analysis
The wide availability of large scale databases requires more efficient and scalable tools for data understanding and knowledge discovery. In this paper, we present a method to ...
Duy-Dinh Le, Shin'ichi Satoh, Michael E. Houle, Da...
ECOOPW
1999
Springer
14 years 2 months ago
The Role of Trust Management in Distributed Systems Security
Existing authorization mechanisms fail to provide powerful and robust tools for handling security at the scale necessary for today's Internet. These mechanisms are coming unde...
Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis
ICB
2007
Springer
139views Biometrics» more  ICB 2007»
14 years 1 months ago
Tracking and Recognition of Multiple Faces at Distances
Many applications require tracking and recognition of multiple faces at distances, such as in video surveillance. Such a task, dealing with non-cooperative objects is more challeng...
Rong Liu, Xiufeng Gao, Rufeng Chu, XiangXin Zhu, S...
ICCV
2007
IEEE
14 years 11 months ago
Video-based Face Recognition on Real-World Data
In this paper, we present the classification sub-system of a real-time video-based face identification system which recognizes people entering through the door of a laboratory. Si...
Johannes Stallkamp, Hazim Kemal Ekenel, Rainer Sti...