Sciweavers

10805 search results - page 2107 / 2161
» Mapping Computation with No Memory
Sort
View
SACMAT
2011
ACM
14 years 6 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deļ¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
149
Voted
ICDCS
2011
IEEE
14 years 3 months ago
E-Shadow: Lubricating Social Interaction Using Mobile Phones
—In this paper, we propose E-Shadow, a distributed mobile phone-based local social networking system. E-Shadow has two main components: (1) Local profiles. They enable EShadow u...
Jin Teng, Boying Zhang, Xinfeng Li, Xiaole Bai, Do...
AVI
2010
15 years 4 months ago
Advanced visual analytics interfaces
Advanced visual interfaces, like the ones found in informaualization, intend to offer a view on abstract data spaces to enable users to make sense of them. By mapping data to visu...
Daniel A. Keim, Peter Bak, Enrico Bertini, Daniela...
146
Voted
COMGEO
2012
ACM
13 years 11 months ago
Point-set embeddings of plane 3-trees
A straight-line drawing of a plane graph G is a planar drawing of G, where each vertex is drawn as a point and each edge is drawn as a straight line segment. Given a set S of n poi...
Rahnuma Islam Nishat, Debajyoti Mondal, Md. Saidur...
144
Voted
MOBICOM
2012
ACM
13 years 5 months ago
Locating in fingerprint space: wireless indoor localization with little human intervention
Indoor localization is of great importance for a range of pervasive applications, attracting many research efforts in the past decades. Most radio-based solutions require a proce...
Zheng Yang, Chenshu Wu, Yunhao Liu
« Prev « First page 2107 / 2161 Last » Next »