Sciweavers

4062 search results - page 767 / 813
» Using Performance Models to Dynamically Control E-Business P...
Sort
View
ACSAC
1998
IEEE
14 years 1 months ago
Application-Level Isolation to Cope with Malicious Database Users
System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore us...
Sushil Jajodia, Peng Liu, Catherine D. McCollum
ATAL
2007
Springer
14 years 3 months ago
Empirical game-theoretic analysis of the TAC Supply Chain game
The TAC Supply Chain Management (TAC/SCM) game presents a challenging dynamic environment for autonomous decision-making in a salient application domain. Strategic interactions co...
Patrick R. Jordan, Christopher Kiekintveld, Michae...
ACMACE
2007
ACM
14 years 28 days ago
Remote augmented reality for multiple players over network
Augmented Reality (AR) in multimedia gaming is a dynamic and exciting field of research. One of the challenges is to have multiple users interacting in the networked augmented rea...
Daniel Chun-Ming Leung, Pak-Shing Au, Irwin King, ...
BMCBI
2010
163views more  BMCBI 2010»
13 years 9 months ago
Reduced representation of protein structure: implications on efficiency and scope of detection of structural similarity
Background: Computational comparison of two protein structures is the starting point of many methods that build on existing knowledge, such as structure modeling (including modeli...
Zong Hong Zhang, Hwee Kuan Lee, Ivana Mihalek
ICPR
2004
IEEE
14 years 10 months ago
3D Face Pose Tracking From an Uncalibrated Monocular Camera
ct We propose a new near-real time technique for 3D face pose tracking from a monocular image sequence obtained from an uncalibrated camera. The basic idea behind our approach is t...
Qiang Ji, Zhiwei Zhu