Sciweavers

2339 search results - page 372 / 468
» A student-directed computing community
Sort
View
OTM
2007
Springer
15 years 7 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
SEAFOOD
2007
Springer
15 years 7 months ago
The Value of Outsourced Software
Outsourcing of work to support software development and services is seen primarily as a transfer of labor to another shore. But intellectual property, as software, is transferred a...
Gio Wiederhold, Amar Gupta, Rajat Mittal, Erich J....
WEBI
2007
Springer
15 years 7 months ago
Contextual Prediction of Communication Flow in Social Networks
The paper develops a novel computational framework for predicting communication flow in social networks based on several contextual features. The problem is important because pred...
Munmun De Choudhury, Hari Sundaram, Ajita John, Do...
3DPVT
2006
IEEE
180views Visualization» more  3DPVT 2006»
15 years 7 months ago
Building a 3D Virtual Museum of Native American Baskets
— In this paper we report our progress in building a system for the acquisition, analysis, and visualization of a collection of Native Californian baskets from the Phoebe A. Hear...
Volkan Isler, Bradford Wilson, Ruzena Bajcsy
CRV
2006
IEEE
99views Robotics» more  CRV 2006»
15 years 7 months ago
The McGill Object Detection Suite
Evaluation of object detection systems requires a set of test images with objects in heterogeneous scenes. Unfortunately, existing publicly available object databases provide few,...
Donovan H. Parks, Martin D. Levine