Sciweavers

1512 search results - page 298 / 303
» Some Methodological Issues for Intelligent Information Syste...
Sort
View
DRM
2003
Springer
14 years 2 months ago
Constructing a virtual primary key for fingerprinting relational data
Agrawal and Kiernan’s watermarking technique for database relations [1] and Li et al’s fingerprinting extension [6] both depend critically on primary key attributes. Hence, t...
Yingjiu Li, Vipin Swarup, Sushil Jajodia
GRID
2007
Springer
14 years 2 months ago
Resource usage policy expression and enforcement in grid computing
-- To date, not enough attention has been paid to issues surrounding the description and enforcement of policies for controlling Grid resources. These policies define the permitted...
Jun Feng, Glenn S. Wasson, Marty Humphrey
CA
1998
IEEE
14 years 1 months ago
Real-Time Facial Animation based upon a Bank of 3D Facial Expressions
The importance of faces in human interaction explains the desire for synthetic faces as a communication vehicle in computer graphics. Unfortunately, animating a face is a very com...
C. Kouadio, Pierre Poulin, P. Lachapelle
ICDE
2010
IEEE
197views Database» more  ICDE 2010»
14 years 8 months ago
Monitoring Continuous State Violation in Datacenters: Exploring the Time Dimension
Monitoring global states of an application deployed over distributed nodes becomes prevalent in today's datacenters. State monitoring requires not only correct monitoring resu...
Shicong Meng, Ting Wang, Ling Liu
MOBICOM
2004
ACM
14 years 2 months ago
Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks
The wide-scale deployment of IEEE 802.11 wireless networks has generated significant challenges for Information Technology (IT) departments in corporations. Users frequently comp...
Atul Adya, Paramvir Bahl, Ranveer Chandra, Lili Qi...