Sciweavers

2165 search results - page 172 / 433
» cases 2005
Sort
View
HICSS
2005
IEEE
148views Biometrics» more  HICSS 2005»
15 years 9 months ago
Public-Key-Infrastructure Based on a Peer-to-Peer Network
The goal of a Public-Key-Infrastructure (PKI) is to prove whether a cryptographic public key is authentic for a certain user. This information is crucial for the reliability of as...
Thomas Wölfl
ICALT
2005
IEEE
15 years 9 months ago
Collaborative Virtual Environment Technology for People with Autism
This paper focuses on an investigation of Collaborative Virtual Environment (CVE) technology for people with autism, paying particular attention to the use of avatar representatio...
Yufang Cheng, David J. Moore, Paul McGrath, Yulei ...
ICDCS
2005
IEEE
15 years 9 months ago
Optimal Asynchronous Garbage Collection for RDT Checkpointing Protocols
Communication-induced checkpointing protocols that ensure rollback-dependency trackability (RDT) guarantee important properties to the recovery system without explicit coordinatio...
Rodrigo Schmidt, Islene C. Garcia, Fernando Pedone...
ICDE
2005
IEEE
107views Database» more  ICDE 2005»
15 years 9 months ago
Search Experiment of Business-Rule by Dynamic Constraint Algebra
Abstract Although e-commerce is becoming popular, product rules, which describe various conditions such as prices, applicability, and discount conditions are still expressed in nat...
Rui Kimura, Takayuki Shiga, Mizuho Iwaihara
ICDM
2005
IEEE
187views Data Mining» more  ICDM 2005»
15 years 9 months ago
Parallel Algorithms for Distance-Based and Density-Based Outliers
An outlier is an observation that deviates so much from other observations as to arouse suspicion that it was generated by a different mechanism. Outlier detection has many applic...
Elio Lozano, Edgar Acuña