Sciweavers

1221 search results - page 27 / 245
» A Comparison of Two Programming Models for Pervasive Computi...
Sort
View
PERVASIVE
2007
Springer
15 years 1 months ago
Securing Pocket Hard Drives
Inexpensive portable storage devices that are available in the market today have made it easier for users to carry data and programs with them and borrow computing platforms when ...
Nishkam Ravi, Chandra Narayanaswami, Mandayam T. R...
SPC
2005
Springer
15 years 7 months ago
Exploiting Empirical Engagement in Authentication Protocol Design
We develop the theme of an earlier paper [3], namely that security protocols for pervasive computing frequently need to exploit empirical channels and that the latter can be classi...
Sadie Creese, Michael Goldsmith, Richard Harrison,...
ICMCS
2006
IEEE
243views Multimedia» more  ICMCS 2006»
15 years 8 months ago
A Comparison of Three 3-D Facial Reconstruction Approaches
We compare three Computer Vision approaches to 3-D reconstruction, namely passive Binocular Stereo and active Structured Lighting and Photometric Stereo, in application to human f...
Alexander Woodward, Da An, Georgy L. Gimel'farb, P...
CONSTRAINTS
2011
14 years 5 months ago
CP and IP approaches to cancer radiotherapy delivery optimization
Abstract. We consider the problem of decomposing an integer matrix into a positively weighted sum of binary matrices that have the consecutive-ones property. This problem is well-k...
Davaatseren Baatar, Natashia Boland, Sebastian Bra...
SEKE
2007
Springer
15 years 8 months ago
TRAP.NET: A Realization of Transparent Shaping in .NET
We define adaptability as the capacity of software in adjusting its behavior in response to changing conditions. To list just a few examples, adaptability is important in pervasiv...
Seyed Masoud Sadjadi, Fernando Trigoso