Sciweavers

1204 search results - page 182 / 241
» Is Echo a Complex Adaptive System
Sort
View
POLICY
2001
Springer
15 years 8 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
140
Voted
GCC
2006
Springer
15 years 7 months ago
General Running Service: An Execution Framework for Executing Legacy Program on Grid
Legacy program execution system, which is necessary for Grid to enable users to reuse all legacy programs without reengineering source codes, is still an open problem. We propose ...
Likun Liu, Yongwei Wu, Guangwen Yang, Ruyue Ma, Fe...
145
Voted
ASSETS
2008
ACM
15 years 5 months ago
A user evaluation of the SADIe transcoder
The World Wide Web (Web) is a visually complex, dynamic, multimedia system that can be inaccessible to people with visual impairments. SADIe addresses this problem by using Semant...
Darren Lunn, Sean Bechhofer, Simon Harper
117
Voted
CLOUDCOM
2010
Springer
15 years 1 months ago
REMEM: REmote MEMory as Checkpointing Storage
Checkpointing is a widely used mechanism for supporting fault tolerance, but notorious in its high-cost disk access. The idea of memory-based checkpointing has been extensively stu...
Hui Jin, Xian-He Sun, Yong Chen, Tao Ke
144
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Robust talking face video verification using joint factor analysis and sparse representation on GMM mean shifted supervectors
It has been previously demonstrated that systems based on block wise local features and Gaussian mixture models (GMM) are suitable for video based talking face verification due t...
Ming Li, Shrikanth Narayanan