Sciweavers

8499 search results - page 1601 / 1700
» network 2007
Sort
View
IJCV
2007
159views more  IJCV 2007»
13 years 9 months ago
Face Hallucination: Theory and Practice
In this paper, we study face hallucination, or synthesizing a high-resolution face image from an input low-resolution image, with the help of a large collection of other high-reso...
Ce Liu, Heung-Yeung Shum, William T. Freeman
IJHPCA
2007
116views more  IJHPCA 2007»
13 years 9 months ago
Parallel Languages and Compilers: Perspective From the Titanium Experience
We describe the rationale behind the design of key features of Titanium—an explicitly parallel dialect of JavaTM for high-performance scientific programming—and our experienc...
Katherine A. Yelick, Paul N. Hilfinger, Susan L. G...
IJNSEC
2007
108views more  IJNSEC 2007»
13 years 9 months ago
Mobility Management with Distributed AAA Architecture
Mobile IP has been defined by Third Generation Partnership Project 2(3GPP2) to be the mobility solution for the next generation cellular networks. The Mobile IP related issues th...
Lin-Huang Chang, Che Lin Lo, Jui Jen Lo, Wei-Ting ...
IJNSEC
2007
144views more  IJNSEC 2007»
13 years 9 months ago
IPLess Stochastic Anonymous Routing Algorithm Using Multi-Agent Systems
The ability of communicating with a selected party anonymously is an important aspect of network security. Communicating anonymously means that no adversary can discern who is com...
Magdy Saeb, Meer Hamza, Ahmed El-Shikh
IJNSEC
2007
139views more  IJNSEC 2007»
13 years 9 months ago
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications
Large scale distributed applications combine network access with multiple storage and computational elements. The distributed responsibility for resource control creates new secur...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
« Prev « First page 1601 / 1700 Last » Next »