Sciweavers

889 search results - page 123 / 178
» Problems in Rewriting III
Sort
View
ESORICS
2007
Springer
14 years 4 months ago
Incorporating Temporal Capabilities in Existing Key Management Schemes
The problem of key management in access hierarchies studies ways to assign keys to users and classes such that each user, after receiving her secret key(s), is able to independentl...
Mikhail J. Atallah, Marina Blanton, Keith B. Frikk...
ICB
2007
Springer
280views Biometrics» more  ICB 2007»
14 years 4 months ago
3D Model-Based Face Recognition in Video
Face recognition in video has gained wide attention due to its role in designing surveillance systems. One of the main advantages of video over still frames is that evidence accumu...
Unsang Park, Anil K. Jain
PCM
2007
Springer
150views Multimedia» more  PCM 2007»
14 years 4 months ago
Robust Speaking Face Identification for Video Analysis
We investigate the problem of automatically identifying speaking faces for video analysis using only the visual information. Intuitively, mouth should be first accurately located i...
Yi Wu, Wei Hu, Tao Wang, Yimin Zhang, Jian Cheng, ...
ICEBE
2006
IEEE
91views Business» more  ICEBE 2006»
14 years 4 months ago
SOA-Driven Business-Software Alignment
The alignment of business processes and their supporting application software is a major concern during the initial software design phases. This paper proposes a design approach a...
Boris Shishkov, Marten van Sinderen, Dick A. C. Qu...
IPPS
2006
IEEE
14 years 4 months ago
Loosely-coupled loop scheduling in computational grids
Loop distribution is one of the most useful techniques to reduce the execution time of parallel applications. Traditionally, loop scheduling algorithms are implemented based on pa...
Jose Herrera, Eduardo Huedo, Rubén S. Monte...