Sciweavers

356 search results - page 63 / 72
» Revisiting the Paxos Algorithm
Sort
View
CORR
2007
Springer
147views Education» more  CORR 2007»
13 years 6 months ago
Coding Solutions for the Secure Biometric Storage Problem
—The paper studies the problem of securely storing biometric passwords, such as fingerprints and irises. With the help of coding theory Juels and Wattenberg derived in 1999 a sc...
Davide Schipani, Joachim Rosenthal
IJCV
2007
146views more  IJCV 2007»
13 years 6 months ago
Image-Based Modeling by Joint Segmentation
The paper first traces the image-based modeling back to feature tracking and factorization that have been developed in the group led by Kanade since the eighties. Both feature tra...
Long Quan, Jingdong Wang, Ping Tan, Lu Yuan
ASE
2005
96views more  ASE 2005»
13 years 6 months ago
A Termination Detection Protocol for Use in Mobile Ad Hoc Networks
As devices become smaller and wireless networking technologies improve, the popularity of mobile computing continues to rise. In today's world, many consider devices such as c...
Gruia-Catalin Roman, Jamie Payton
CCR
2004
103views more  CCR 2004»
13 years 6 months ago
Reconsidering wireless systems with multiple radios
The tremendous popularity of wireless systems in recent years has led to the commoditization of RF transceivers (radios) whose prices have fallen dramatically. The lower cost allo...
Paramvir Bahl, Atul Adya, Jitendra Padhye, Alec Wo...
PVLDB
2010
89views more  PVLDB 2010»
13 years 5 months ago
Recognizing Patterns in Streams with Imprecise Timestamps
Large-scale event systems are becoming increasingly popular in a variety of domains. Event pattern evaluation plays a key role in monitoring applications in these domains. Existin...
Haopeng Zhang, Yanlei Diao, Neil Immerman