Sciweavers

24105 search results - page 4648 / 4821
» Models in Information Retrieval
Sort
View
CSFW
1999
IEEE
14 years 3 months ago
Athena: A New Efficient Automatic Checker for Security Protocol Analysis
We propose an efficient automatic checking algorithm, Athena, for analyzing security protocols. Athena incorporates a logic that can express security properties including authenti...
Dawn Xiaodong Song
PADS
1999
ACM
14 years 3 months ago
Shock Resistant Time Warp
In an attempt to cope with time-varying workload, traditional adaptive Time Warp protocols are designed to react in response to performance changes by altering control parameter c...
Alois Ferscha, James Johnson
SIGMETRICS
1999
ACM
120views Hardware» more  SIGMETRICS 1999»
14 years 2 months ago
A Performance Study of Dynamic Replication Techniques in Continuous Media Servers
Multimedia applications are emerging in education, information dissemination, entertainment, as well as many other applications. The stringent requirements of such applications ma...
Cheng-Fu Chou, Leana Golubchik, John C. S. Lui
HOTOS
1999
IEEE
14 years 2 months ago
Elephant: The File System That Never Forgets
Modern file systems associate the deletion of a file with the release of the storage associated with that file, and file writes with the irrevocable change of file contents. We pr...
Douglas J. Santry, Michael J. Feeley, Norman C. Hu...
ICCV
1999
IEEE
14 years 2 months ago
3D Pose Tracking with Linear Depth and Brightness Constraints
This paper explores the direct motion estimation problem assuming that video-rate depth information is available, from either stereo cameras or other sensors. We use these depth m...
Michael Harville, Ali Rahimi, Trevor Darrell, Gail...
« Prev « First page 4648 / 4821 Last » Next »