Sciweavers

8644 search results - page 1629 / 1729
» On the Composition of Secure Systems
Sort
View
HIPC
2005
Springer
14 years 3 months ago
Design and Implementation of the HPCS Graph Analysis Benchmark on Symmetric Multiprocessors
Graph theoretic problems are representative of fundamental computations in traditional and emerging scientific disciplines like scientific computing, computational biology and b...
David A. Bader, Kamesh Madduri
ICCSA
2005
Springer
14 years 3 months ago
Resource and Service Discovery in the iGrid Information Service
In this paper we describe resource and service discovery mechanisms available in iGrid, a novel Grid Information Service based on the relational model. iGrid is developed within th...
Giovanni Aloisio, Massimo Cafaro, Italo Epicoco, S...
IDEAL
2005
Springer
14 years 3 months ago
Identification of Anomalous SNMP Situations Using a Cooperative Connectionist Exploratory Projection Pursuit Model
Abstract. The work presented in this paper shows the capability of a connectionist model, based on a statistical technique called Exploratory Projection Pursuit (EPP), to identify ...
Álvaro Herrero, Emilio Corchado, José...
ISVC
2005
Springer
14 years 3 months ago
Investigating the Impact of Face Categorization on Recognition Performance
Face recognition is a key biometric technology with a wide range of potential applications both in government and private sectors. Despite considerable progress in face recognition...
Konstantinos Veropoulos, George Bebis, Michael A. ...
PERVASIVE
2005
Springer
14 years 3 months ago
Simultaneous Tracking and Activity Recognition (STAR) Using Many Anonymous, Binary Sensors
Abstract. In this paper we introduce the simultaneous tracking and activity recognition (STAR) problem, which exploits the synergy between location and activity to provide the info...
D. H. Wilson, Christopher G. Atkeson
« Prev « First page 1629 / 1729 Last » Next »