Sciweavers

3692 search results - page 701 / 739
» Active learning and its use in computer science
Sort
View
SACMAT
2011
ACM
14 years 16 days ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deļ¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
HUC
2011
Springer
13 years 9 months ago
Mediated tabletop interaction in the biology lab: exploring the design space of the rabbit
Interactive surfaces like diffuse illumination tabletops (DIT) identify and track objects using multiple techniques like shape and color recognition, fiducial markers, electronic...
Juan David Hincapié-Ramos, Aurélien ...
CVPR
2010
IEEE
15 years 6 months ago
SVM for Edge-Preserving Filtering
In this paper, we propose a new method to construct an edge-preserving filter which has very similar response to the bilateral filter. The bilateral filter is a normalized convolu...
Qingxiong Yang, Shengnan Wang, Narendra Ahuja
FC
2010
Springer
171views Cryptology» more  FC 2010»
15 years 1 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ā€˜take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
VIS
2007
IEEE
80views Visualization» more  VIS 2007»
15 years 11 months ago
Topologically Clean Distance Fields
Analysis of materials obtained from physical simulations is important in the physical sciences. Our research was motivated by the need to investigate the properties of a simulated...
Attila G. Gyulassy, Mark A. Duchaineau, Vijay Na...