Sciweavers

17983 search results - page 3571 / 3597
» Set Types and Applications
Sort
View
SRDS
2010
IEEE
13 years 5 months ago
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (...
Pelin Angin, Bharat K. Bhargava, Rohit Ranchal, No...
CLUSTER
2009
IEEE
13 years 5 months ago
Design alternatives for implementing fence synchronization in MPI-2 one-sided communication for InfiniBand clusters
Scientific computing has seen an immense growth in recent years. The Message Passing Interface (MPI) has become the de-facto standard for parallel programming model for distribute...
Gopalakrishnan Santhanaraman, Tejus Gangadharappa,...
FLAIRS
2009
13 years 5 months ago
Are Ontologies Involved in Natural Language Processing?
For certain disable persons unable to communicate, we present a palliative aid which consist of a virtual pictographic keyboard associated to a text processing from a pictographic...
Maryvonne Abraham
GI
2009
Springer
13 years 5 months ago
Source Conflicts in Bayesian Identification
: In Bayesian identification an ID source is in conflict with the other ID sources, if both provide substantially different, reliable information on a tracked object. After discuss...
Max Krüger, David Hirschhäuser
HVEI
2009
13 years 5 months ago
Sign language perception research for improving automatic sign language recognition
Current automatic sign language recognition (ASLR) seldom uses perceptual knowledge about the recognition of sign language. Using such knowledge can improve ASLR because it can gi...
Gineke A. ten Holt, Jeroen Arendsen, Huib de Ridde...
« Prev « First page 3571 / 3597 Last » Next »