Sciweavers

739 search results - page 60 / 148
» Information Flow in Credential Systems
Sort
View
ICPR
2008
IEEE
14 years 9 months ago
Spatio-temporal 3D pose estimation and tracking of human body parts using the Shape Flow algorithm
In this contribution we introduce the Shape Flow algorithm (SF), a novel method for spatio-temporal 3D pose estimation of a 3D parametric curve. The SF is integrated into a tracki...
Markus Hahn, Lars Krüger, Christian Wöhl...
MIDDLEWARE
2007
Springer
14 years 1 months ago
A multi-commodity flow approach to maximising utility in linked market-based grids
In this paper we consider the problem of maximising utility in linked market-driven distributed and Grid systems. In such systems, users submit jobs through brokers who can virtua...
James Broberg, Rajkumar Buyya
SIGSOFT
2006
ACM
14 years 8 months ago
Testing context-aware middleware-centric programs: a data flow approach and an RFID-based experimentation
Pervasive context-aware software is an emerging kind of application. Smart personal digital assistants and RFID-based location sensing software are two examples. Many of these sys...
Heng Lu, W. K. Chan, T. H. Tse
ATAL
2008
Springer
13 years 9 months ago
Regulating air traffic flow with coupled agents
The ability to provide flexible, automated management of air traffic is critical to meeting the ever increasing needs of the next generation air transportation systems. This probl...
Adrian K. Agogino, Kagan Tumer
CC
2007
Springer
14 years 1 months ago
Correcting the Dynamic Call Graph Using Control-Flow Constraints
Abstract. To reason about programs, dynamic optimizers and analysis tools use sampling to collect a dynamic call graph (DCG). However, sampling has not achieved high accuracy with ...
Byeongcheol Lee, Kevin Resnick, Michael D. Bond, K...