Sciweavers

1553 search results - page 233 / 311
» Talking Faces - Technologies and Applications
Sort
View
ISI
2004
Springer
14 years 3 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
VLDB
2004
ACM
111views Database» more  VLDB 2004»
14 years 3 months ago
Lifting the Burden of History from Adaptive Query Processing
Adaptive query processing schemes attempt to reoptimize query plans during the course of query execution. A variety of techniques for adaptive query processing have been proposed,...
Amol Deshpande, Joseph M. Hellerstein
DATE
2003
IEEE
109views Hardware» more  DATE 2003»
14 years 3 months ago
Run-Time Management of Logic Resources on Reconfigurable Systems
Dynamically reconfigurable systems based on partial and dynamically reconfigurable FPGAs may have their functionality partially modified at run-time without stopping the operation...
Manuel G. Gericota, Gustavo R. Alves, Miguel L. Si...
HICSS
2003
IEEE
198views Biometrics» more  HICSS 2003»
14 years 3 months ago
Allocating Time and Resources in Project Management Under Uncertainty
We define and develop a solution approach for planning, scheduling and managing project efforts where there is significant uncertainty in the duration, resource requirements and o...
Mark A. Turnquist, Linda K. Nozick
ICNP
2003
IEEE
14 years 3 months ago
Mobile Distributed Information Retrieval for Highly-Partitioned Networks
We propose and evaluate a mobile, peer-to-peer Information Retrieval system. Such a system can, for example, support medical care in a disaster by allowing access to a large colle...
Katrina M. Hanna, Brian Neil Levine, R. Manmatha