Sciweavers

35419 search results - page 163 / 7084
» How are we doing
Sort
View
122
Voted
INFOCOM
1998
IEEE
15 years 8 months ago
How Bad is Reliable Multicast without Local Recovery?
We examine the impact of the loss recovery mechanism on the performance of a reliable multicast protocol. Approaches to reliable multicast can be divided into two major classes: s...
Jörg Nonnenmacher, Martin S. Lacher, Matthias...
WETICE
1997
IEEE
15 years 8 months ago
How Role Based Access Control is Implemented in SESAME
In this paper we want to share our experiences with implementing a scheme that enforces role based access control in a distributed, heterogeneous computing environment. This work ...
Mark Vandenwauver, René Govaerts, Joos Vand...
DAGM
2007
Springer
15 years 8 months ago
How to Find Interesting Locations in Video: A Spatiotemporal Interest Point Detector Learned from Human Eye Movements
Interest point detection in still images is a well-studied topic in computer vision. In the spatiotemporal domain, however, it is still unclear which features indicate useful inter...
Wolf Kienzle, Bernhard Schölkopf, Felix A. Wi...
ECTEL
2006
Springer
15 years 7 months ago
The User as Prisoner: How the Dilemma Might Dissolve
Abstract. Content objects are essential links between Knowledge Management and E-Learning systems. Therefore content authoring and sharing is an important, interdisciplinary topic ...
Andrea Kohlhase
145
Voted
EDO
2006
Springer
15 years 7 months ago
Ubiquitous RATs: how resource-aware run-time tests can improve ubiquitous software systems
In this paper we describe a new approach for increasing the reliability of ubiquitous software systems. This is achieved by executing tests at run-time. The individual software co...
Matthias Merdes, Rainer Malaka, Dima Suliman, Barb...