Sciweavers

17983 search results - page 3571 / 3597
» Set Types and Applications
Sort
View
217
Voted
SRDS
2010
IEEE
15 years 13 days ago
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (...
Pelin Angin, Bharat K. Bhargava, Rohit Ranchal, No...
142
Voted
CLUSTER
2009
IEEE
15 years 11 days ago
Design alternatives for implementing fence synchronization in MPI-2 one-sided communication for InfiniBand clusters
Scientific computing has seen an immense growth in recent years. The Message Passing Interface (MPI) has become the de-facto standard for parallel programming model for distribute...
Gopalakrishnan Santhanaraman, Tejus Gangadharappa,...
FLAIRS
2009
15 years 10 days ago
Are Ontologies Involved in Natural Language Processing?
For certain disable persons unable to communicate, we present a palliative aid which consist of a virtual pictographic keyboard associated to a text processing from a pictographic...
Maryvonne Abraham
154
Voted
GI
2009
Springer
15 years 10 days ago
Source Conflicts in Bayesian Identification
: In Bayesian identification an ID source is in conflict with the other ID sources, if both provide substantially different, reliable information on a tracked object. After discuss...
Max Krüger, David Hirschhäuser
152
Voted
HVEI
2009
15 years 10 days ago
Sign language perception research for improving automatic sign language recognition
Current automatic sign language recognition (ASLR) seldom uses perceptual knowledge about the recognition of sign language. Using such knowledge can improve ASLR because it can gi...
Gineke A. ten Holt, Jeroen Arendsen, Huib de Ridde...
« Prev « First page 3571 / 3597 Last » Next »