Sciweavers

1619 search results - page 194 / 324
» Important Moments in Systems and Control
Sort
View
ACMSE
2006
ACM
14 years 3 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin
WMCSA
1999
IEEE
14 years 1 months ago
Broadcast of Consistent Data to Read-Only Transactions from Mobile Clients
In this paper, we study the inconsistency problem in data broadcast. While data items in a mobile computing system are being broadcast, update transactions may install new values ...
Kam-yiu Lam, Mei-Wau Au, Edward Chan
CA
1996
IEEE
14 years 1 months ago
Modeling, Tracking and Interactive Animation of Faces and Heads Using Input from Video
We describe tools that use measurements from video for the extraction of facial modeling and animation parameters, head tracking, and real-time interactive facial animation. These...
Irfan A. Essa, Sumit Basu, Trevor Darrell, Alex Pe...
EEE
2004
IEEE
14 years 1 months ago
Secure Online Examination Architecture Based on Distributed Firewall
Online (Web-based) examination is an effective solution for mass education evaluation. However, due to the incomplete of network security, students can communicate with each other...
Chi-Chien Pan, Kai-Hsiang Yang, Tzao-Lin Lee
LCPC
2000
Springer
14 years 26 days ago
Recursion Unrolling for Divide and Conquer Programs
This paper presents recursion unrolling, a technique for improving the performance of recursive computations. Conceptually, recursion unrolling inlines recursive calls to reduce c...
Radu Rugina, Martin C. Rinard