Sciweavers

1204 search results - page 182 / 241
» Is Echo a Complex Adaptive System
Sort
View
POLICY
2001
Springer
14 years 4 days ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
GCC
2006
Springer
13 years 11 months ago
General Running Service: An Execution Framework for Executing Legacy Program on Grid
Legacy program execution system, which is necessary for Grid to enable users to reuse all legacy programs without reengineering source codes, is still an open problem. We propose ...
Likun Liu, Yongwei Wu, Guangwen Yang, Ruyue Ma, Fe...
ASSETS
2008
ACM
13 years 9 months ago
A user evaluation of the SADIe transcoder
The World Wide Web (Web) is a visually complex, dynamic, multimedia system that can be inaccessible to people with visual impairments. SADIe addresses this problem by using Semant...
Darren Lunn, Sean Bechhofer, Simon Harper
CLOUDCOM
2010
Springer
13 years 5 months ago
REMEM: REmote MEMory as Checkpointing Storage
Checkpointing is a widely used mechanism for supporting fault tolerance, but notorious in its high-cost disk access. The idea of memory-based checkpointing has been extensively stu...
Hui Jin, Xian-He Sun, Yong Chen, Tao Ke
ICASSP
2011
IEEE
12 years 11 months ago
Robust talking face video verification using joint factor analysis and sparse representation on GMM mean shifted supervectors
It has been previously demonstrated that systems based on block wise local features and Gaussian mixture models (GMM) are suitable for video based talking face verification due t...
Ming Li, Shrikanth Narayanan