Sciweavers

2851 search results - page 483 / 571
» A Knowledge Based Approach on Educational Metadata Use
Sort
View
142
Voted
TIT
2010
146views Education» more  TIT 2010»
14 years 10 months ago
Cooperation with an untrusted relay: a secrecy perspective
We consider the communication scenario where a source-destination pair wishes to keep the information secret from a relay node despite wanting to enlist its help. For this scenario...
Xiang He, Aylin Yener
CVPR
2009
IEEE
16 years 10 months ago
Learning Shape Prior Models for Object Matching
The aim of this work is to learn a shape prior model for an object class and to improve shape matching with the learned shape prior. Given images of example instances, we can le...
Cordelia Schmid, Frédéric Jurie, Tin...
CHI
2008
ACM
16 years 4 months ago
Love and authentication
Passwords are ubiquitous, and users and service providers alike rely on them for their security. However, good passwords may sometimes be hard to remember. For years, security pra...
Markus Jakobsson, Erik Stolterman, Susanne Wetzel,...
123
Voted
CISIS
2010
IEEE
15 years 10 months ago
Semantic Integration of Heterogeneous Data Sources for Monitoring Frequent-Release Software Projects
Abstract—Open source software teams routinely develop complex software products in frequent-release settings with rather lightweight processes and project documentation. In this ...
Stefan Biffl, Wikan Danar Sunindyo, Thomas Moser
161
Voted
SECON
2007
IEEE
15 years 9 months ago
Adaptive Control of Duty Cycling in Energy-Harvesting Wireless Sensor Networks
—Increasingly many wireless sensor network deployments are using harvested environmental energy to extend system lifetime. Because the temporal profiles of such energy sources e...
Christopher M. Vigorito, Deepak Ganesan, Andrew G....