Sciweavers

7741 search results - page 1397 / 1549
» Security in Active Networks
Sort
View
JCP
2007
120views more  JCP 2007»
15 years 4 months ago
Mobile Processes: Enhancing Cooperation in Distributed Mobile Environments
— Currently, context awareness is one of the main trends in distributed mobile computing environments. Against this background, the demand for more complex – and additionally l...
Christian P. Kunze, Sonja Zaplata, Winfried Lamers...
PAMI
2002
112views more  PAMI 2002»
15 years 4 months ago
Recognizing Handwritten Digits Using Hierarchical Products of Experts
The product of experts learning procedure [1] can discover a set of stochastic binary features that constitute a nonlinear generative model of handwritten images of digits. The qua...
Guy Mayraz, Geoffrey E. Hinton
TIM
2010
129views Education» more  TIM 2010»
14 years 11 months ago
Experimental Evaluation of Feedback Modalities for Five Teleoperation Tasks
A distributed telerobotic system is proposed based on a master-arm station that is interconnected by a computer network to a slave-arm station. The distributed telerobotic system i...
Mayez A. Al-Mouhamed, Mohammad Nazeeruddin, S. M. ...
KDD
2009
ACM
296views Data Mining» more  KDD 2009»
16 years 5 months ago
Anonymizing healthcare data: a case study on the blood transfusion service
: Gaining access to high-quality health data is a vital requirement to informed decision making for medical practitioners and pharmaceutical researchers. Driven by mutual benefits ...
Noman Mohammed, Benjamin C. M. Fung, Patrick C. K....
VLSID
2006
IEEE
142views VLSI» more  VLSID 2006»
16 years 5 months ago
Impact of Configurability and Extensibility on IPSec Protocol Execution on Embedded Processors
- Security protocols, such as IPSec and SSL, are being increasingly deployed in the context of networked embedded systems. The resource-constrained nature of embedded systems and, ...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
« Prev « First page 1397 / 1549 Last » Next »