Sciweavers

15251 search results - page 2792 / 3051
» Network Science - Theory and Application
Sort
View
SSD
2007
Springer
124views Database» more  SSD 2007»
15 years 10 months ago
Querying Objects Modeled by Arbitrary Probability Distributions
In many modern applications such as biometric identification systems, sensor networks, medical imaging, geology, and multimedia databases, the data objects are not described exact...
Christian Böhm, Peter Kunath, Alexey Pryakhin...
3DPVT
2006
IEEE
242views Visualization» more  3DPVT 2006»
15 years 10 months ago
Towards On-Line Digital Doubles
We present a modular system for real-time 3D-scanning of human bodies under motion. The high-resolution shape and colour appearance is captured by several scanning units positione...
Andreas Griesser, Nico Cornelis, Luc J. Van Gool
ACSAC
2006
IEEE
15 years 10 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
AICT
2006
IEEE
163views Communications» more  AICT 2006»
15 years 10 months ago
A Methodology for Searching Reusable Business Processes
Web Services are becoming the prominent paradigm for distributed computing and electronic businesses. This makes natural the extension of the concepts at the base of the workflow ...
Francesco Calabrese, Giovanni Di Dio, Anna Rita Fa...
CCGRID
2006
IEEE
15 years 10 months ago
Simple Locality-Aware Co-allocation in Peer-to-Peer Supercomputing
With current grid middleware, it is difficult to deploy distributed supercomputing applications that run concurrently on multiple resources. As current grid middleware systems ha...
Niels Drost, Rob van Nieuwpoort, Henri E. Bal
« Prev « First page 2792 / 3051 Last » Next »