Sciweavers

108 search results - page 5 / 22
» re 2010
Sort
View
PERCOM
2010
ACM
13 years 8 months ago
ReSCo: A middleware component for Reliable Service Composition in pervasive systems
Abstract—Service composition schemes create high-level application services by combining several basic services. Service composition schemes for dynamic, open systems, such as th...
Brent Lagesse, Mohan Kumar, Matthew Wright
JOT
2010
126views more  JOT 2010»
13 years 8 months ago
Inferring design patterns using the ReP graph
Abstract Periodic refactoring of a large source code often becomes a necessity especially for long-lived projects. In order to increase maintainability and extensibility of such pr...
Tushar Sharma, Dharanipragada Janakiram
NSDI
2010
13 years 11 months ago
EndRE: An End-System Redundancy Elimination Service for Enterprises
In many enterprises today, WAN optimizers are being deployed in order to eliminate redundancy in network traffic and reduce WAN access costs. In this paper, we present the design ...
Bhavish Agarwal, Aditya Akella, Ashok Anand, Athul...
CVPR
2010
IEEE
14 years 2 months ago
Person Re-Identification by Symmetry-Driven Accumulation of Local Features
In this paper, we present an appearance-based method for person re-identification. It consists in the extraction of features that model three complementary aspects of the human ap...
Michela Farenzena, Loris Bazzani, Alessandro Perin...
AFRICACRYPT
2010
Springer
14 years 1 months ago
Efficient Unidirectional Proxy Re-Encryption
Abstract. Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into one encrypting the same plaintext for Bob. The proxy only...
Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robe...