Sciweavers

1291 search results - page 219 / 259
» Intrusion Detection for Distributed Applications
Sort
View
CLUSTER
2003
IEEE
14 years 2 months ago
Compiler Optimized Remote Method Invocation
We further increase the efficiency of Java RMI programs. Where other optimizing re-implementations of RMI use pre-processors to create stubs and skeletons and to create class spe...
Ronald Veldema, Michael Philippsen
IJCV
2008
242views more  IJCV 2008»
13 years 8 months ago
3D Urban Scene Modeling Integrating Recognition and Reconstruction
Supplying realistically textured 3D city models at ground level promises to be useful for pre-visualizing upcoming traffic situations in car navigation systems. Because this previs...
Nico Cornelis, Bastian Leibe, Kurt Cornelis, Luc J...
ICMI
2010
Springer
172views Biometrics» more  ICMI 2010»
13 years 6 months ago
Modelling and analyzing multimodal dyadic interactions using social networks
Social network analysis became a common technique used to model and quantify the properties of social interactions. In this paper, we propose an integrated framework to explore th...
Sergio Escalera, Petia Radeva, Jordi Vitrià...
CCGRID
2006
IEEE
14 years 12 days ago
A Feedback Mechanism for Network Scheduling in LambdaGrids
Next-generation e-Science applications will require the ability to transfer information at high data rates between distributed computing centers and data repositories. A LambdaGri...
Pallab Datta, Sushant Sharma, Wu-chun Feng
KDD
2008
ACM
146views Data Mining» more  KDD 2008»
14 years 9 months ago
Spotting out emerging artists using geo-aware analysis of P2P query strings
Record label companies would like to identify potential artists as early as possible in their careers, before other companies approach the artists with competing contracts. The va...
Noam Koenigstein, Yuval Shavitt, Tomer Tankel