Sciweavers

469 search results - page 63 / 94
» Two Approaches for a Servomechanism Control System Using Com...
Sort
View
ACSAC
2001
IEEE
13 years 11 months ago
Determining Privileges of Mobile Agents
This paper describes a method for controlling the behavior of mobile agent-system entities through the allocation of privileges. Privileges refer to policy rules that govern the a...
Wayne A. Jansen
ECCV
2002
Springer
14 years 9 months ago
Face Recognition from Long-Term Observations
We address the problem of face recognition from a large set of images obtained over time - a task arising in many surveillance and authentication applications. A set or a sequence ...
Gregory Shakhnarovich, John W. Fisher III, Trevor ...
SRDS
2005
IEEE
14 years 28 days ago
Enforcing Enterprise-wide Policies Over Standard Client-Server Interactions
We propose and evaluate a novel framework for enforcing global coordination and control policies over interacting software components in enterprise computing environments. This fra...
Zhijun He, Tuan Phan, Thu D. Nguyen
ENVSOFT
2006
72views more  ENVSOFT 2006»
13 years 7 months ago
Integrating legacy components into a software system for storm sewer simulation
This paper presents an approach that integrates a legacy component into a software system for storm sewer simulation. The legacy component employed here is the Storm Water Managem...
Shiu-Shin Lin, Shang-Hsien Hsieh, Jan-Tai Kuo, Yin...
IRI
2005
IEEE
14 years 29 days ago
Issues of hierarchical heterogeneous modeling in component reusability
Heterogeneous systems are systems that obey different functioning laws. For instance, during the design of embedded systems, it is generally necessary to study both the controller...
Aimé Mokhoo Mbobi, Frédéric B...