Sciweavers

5345 search results - page 1058 / 1069
» Using a Technique from Graphic Designers to Develop Innovati...
Sort
View
SASN
2005
ACM
14 years 1 months ago
Key distribution and update for secure inter-group multicast communication
Group communication has become an important component in wireless networks. In this paper, we focus on the environments in which multiple groups coexist in the system, and both in...
Weichao Wang, Bharat K. Bhargava
MM
2004
ACM
136views Multimedia» more  MM 2004»
14 years 28 days ago
Fingerprinting and forensic analysis of multimedia
One of the prime reasons movie and music studios have ignored the Internet for open-networked multimedia content delivery, has been the lack of a technology that can support a sec...
Daniel Schonberg, Darko Kirovski
PR
2008
97views more  PR 2008»
13 years 7 months ago
A vision-based method for weeds identification through the Bayesian decision theory
One of the objectives of precision agriculture is to minimize the volume of herbicides that are applied to the fields through the use of site-specific weed management systems. Thi...
Alberto Tellaeche, Xavier P. Burgos-Artizzu, Gonza...
WWW
2003
ACM
14 years 8 months ago
Personal Voice Call Assistant: VoiceXML and SIP in a Distributed Environment
In this paper we introduce the architecture of a distributed service platform that integrates speech, web technology and voice-overIP technologies and describe how a specific serv...
Michael Pucher, Julia Tertyshnaya, Florian Wegsche...
ICDE
2005
IEEE
122views Database» more  ICDE 2005»
14 years 8 months ago
Uncovering Database Access Optimizations in the Middle Tier with TORPEDO
A popular architecture for enterprise applications is one of a stateless object-based server accessing persistent data through Object-Relational mapping software. The reported ben...
Bruce E. Martin
« Prev « First page 1058 / 1069 Last » Next »