Sciweavers

2421 search results - page 432 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
CVPR
2006
IEEE
14 years 4 months ago
Scalable Recognition with a Vocabulary Tree
A recognition scheme that scales efficiently to a large number of objects is presented. The efficiency and quality is exhibited in a live demonstration that recognizes CD-covers...
David Nistér, Henrik Stewénius
ICNP
2006
IEEE
14 years 4 months ago
Vault: A Secure Binding Service
— Binding services are crucial building blocks in networks and networked applications. A binding service (e.g., the Domain Name System (DNS)) maps certain information, namely, bi...
Guor-Huar Lu, Changho Choi, Zhi-Li Zhang
ADC
2005
Springer
183views Database» more  ADC 2005»
14 years 3 months ago
Discovering User Access Pattern Based on Probabilistic Latent Factor Model
There has been an increased demand for characterizing user access patterns using web mining techniques since the informative knowledge extracted from web server log files can not ...
Guandong Xu, Yanchun Zhang, Jiangang Ma, Xiaofang ...
CAISE
2005
Springer
14 years 3 months ago
Self-Organization in Overlay Networks
Abstract. Overlay networks are an important kind of P2P infrastructures. The range of applications and requirements is broad. Consequently, our research objective are overlay netwo...
Sven Apel, Klemens Böhm
CISIS
2010
IEEE
14 years 3 months ago
Semantic Web Fostering Enterprise 2.0
—The term Enterprise 2.0 applies to the use of Web 2.0 technologies as a support for business activities within the organizations. These technologies are exploited to foster inte...
Nicola Capuano, Matteo Gaeta, Francesco Orciuoli, ...