Sciweavers

1477 search results - page 196 / 296
» Token flow control
Sort
View
ECCV
2008
Springer
14 years 12 months ago
Contour Context Selection for Object Detection: A Set-to-Set Contour Matching Approach
Abstract. We introduce a shape detection framework called Contour Context Selection for detecting objects in cluttered images using only one exemplar. Shape based detection is inva...
Qihui Zhu, Liming Wang, Yang Wu, Jianbo Shi
ICC
2009
IEEE
115views Communications» more  ICC 2009»
14 years 4 months ago
End-Host Authentication and Authorization for Middleboxes Based on a Cryptographic Namespace
—Today, middleboxes such as firewalls and network address translators have advanced beyond simple packet forwarding and address mapping. They also inspect and filter traffic, ...
Tobias Heer, René Hummen, Miika Komu, Stefa...
ICC
2007
IEEE
106views Communications» more  ICC 2007»
14 years 4 months ago
A Hierarchical Weighted Round Robin EPON DBA Scheme and Its Comparison with Cyclic Water-Filling Algorithm
—A H-WRR (Hierarchical Weighted Round-Robin) EPON (Ethernet Passive Optical Network) DBA (Dynamic Bandwidth Allocation) algorithm is devised and investigated. WRR table entries h...
Chan Kim, Tae-Whan Yoo, Bong-Tae Kim
DIM
2006
ACM
14 years 4 months ago
User centricity: a taxonomy and open issues
User centricity is a significant concept in federated identity management (FIM), as it provides for stronger user control and privacy. However, several notions of user-centricity...
Abhilasha Bhargav-Spantzel, Jan Camenisch, Thomas ...
CGO
2003
IEEE
14 years 3 months ago
Optimizing Memory Accesses For Spatial Computation
In this paper we present the internal representation and optimizations used by the CASH compiler for improving the memory parallelism of pointer-based programs. CASH uses an SSA-b...
Mihai Budiu, Seth Copen Goldstein