Sciweavers

6229 search results - page 1238 / 1246
» Models of Computation for Networks on Chip
Sort
View
ICPIA
1992
13 years 11 months ago
Intelligent Pattern Recognition and Applications
:: This talk deals with fundamental aspects of Intelligent Pattern Recognition (IPR) and applications. It basically includes the following: Overview of 3D Biometric Technology and ...
Patrick Shen-Pei Wang
WMRD
1990
13 years 11 months ago
Replication in Ficus Distributed File Systems
Ficus is a replicated general ling environment for Unix intended to scale to very large nationwide networks. The system employs an optimistic one copy availability" model in ...
Gerald J. Popek, Richard G. Guy, Thomas W. Page Jr...
CCS
2008
ACM
13 years 9 months ago
Securing group key exchange against strong corruptions
When users run a group key exchange (GKE) protocol, they usually extract the key from some auxiliary (ephemeral) secret information generated during the execution. Strong corrupti...
Emmanuel Bresson, Mark Manulis
ECOOP
2008
Springer
13 years 9 months ago
Programming with Live Distributed Objects
A component revolution is underway, bringing developers improved productivity and opportunities for code reuse. However, whereas existing tools work well for builders of desktop ap...
Krzysztof Ostrowski, Ken Birman, Danny Dolev, Jong...
NIPS
1997
13 years 9 months ago
Task and Spatial Frequency Effects on Face Specialization
There is strong evidence that face processing is localized in the brain. The double dissociation between prosopagnosia, a face recognition deficit occurring after brain damage, a...
Matthew N. Dailey, Garrison W. Cottrell
« Prev « First page 1238 / 1246 Last » Next »