Sciweavers

1795 search results - page 225 / 359
» Security Models and Information Flow
Sort
View
MOBIHOC
2006
ACM
14 years 9 months ago
Proportionally fair allocation of end-to-end bandwidth in STDMA wireless networks
We consider the problem of designing distributed mechanisms for joint congestion control and resource allocation in spatial-reuse TDMA wireless networks. The design problem is pos...
Pablo Soldati, Björn Johansson, Mikael Johans...
SIGCSE
2008
ACM
141views Education» more  SIGCSE 2008»
13 years 10 months ago
Broadening participation through scalable game design
Game development is quickly gaining popularity in introductory programming courses. Motivational and educational aspects of game development are hard to balance and often sacrific...
Alexander Repenning, Andri Ioannidou
CIKM
2006
Springer
14 years 1 months ago
k nearest neighbor classification across multiple private databases
Distributed privacy preserving data mining tools are critical for mining multiple databases with a minimum information disclosure. We present a framework including a general model...
Li Xiong, Subramanyam Chitti, Ling Liu
WWW
2004
ACM
14 years 11 months ago
Trust-serv: model-driven lifecycle management of trust negotiation policies for web services
A scalable approach to trust negotiation is required in Web service environments that have large and dynamic requester populations. We introduce Trust-Serv, a model-driven trust n...
Halvard Skogsrud, Boualem Benatallah, Fabio Casati
COST
2008
Springer
287views Multimedia» more  COST 2008»
14 years 10 hour ago
Facial Expressions Recognition from Image Sequences
Abstract. Human machine interaction is one of the emerging fields for the coming years. Interacting with others in our daily life is a face to face interaction. Faces are the natur...
Zahid Riaz, Christoph Mayer, Michael Beetz, Bernd ...