Sciweavers

577 search results - page 98 / 116
» Smartsockets: solving the connectivity problems in grid comp...
Sort
View
SACMAT
2004
ACM
14 years 29 days ago
Using trust and risk in role-based access control policies
Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their ...
Nathan Dimmock, András Belokosztolszki, Dav...
HPCC
2007
Springer
14 years 1 months ago
DISH - Dynamic Information-Based Scalable Hashing on a Cluster of Web Cache Servers
Caching web pages is an important part of web infrastructure. The effects of caching services are even more pronounced for wireless infrastructures due to their limited bandwidth. ...
Andrew Sohn, Hukeun Kwak, Kyusik Chung
ICCV
2005
IEEE
14 years 9 months ago
Recovering Human Body Configurations Using Pairwise Constraints between Parts
The goal of this work is to recover human body configurations from static images. Without assuming a priori knowledge of scale, pose or appearance, this problem is extremely chall...
Xiaofeng Ren, Alexander C. Berg, Jitendra Malik
SIGUCCS
1998
ACM
13 years 11 months ago
The ResNet Obstacle Course
There are many ways to train student employees, but hands-on experience is invaluable. To provide our Resident Computer Consultants (RCCs) with the experience they need to solve t...
Kathleen A. Hausmann
AIPS
2006
13 years 9 months ago
Combining Knowledge Compilation and Search for Conformant Probabilistic Planning
We present a new algorithm for conformant probabilistic planning, which for a given horizon produces a plan that maximizes the probability of success under quantified uncertainty ...
Jinbo Huang