Sciweavers

5570 search results - page 1014 / 1114
» Applications of Fair Testing
Sort
View
COLING
2010
14 years 10 months ago
HowNet and Its Computation of Meaning
The presentation will mainly cover (1) What is HowNet? HowNet is an on-line common-sense knowledgebase unveiling inter-conceptual relationships and interattribute relationships of...
Zhendong Dong, Qiang Dong, Changling Hao
166
Voted
FGR
2011
IEEE
288views Biometrics» more  FGR 2011»
14 years 7 months ago
Hierarchical CRF with product label spaces for parts-based models
— Non-rigid object detection is a challenging open research problem in computer vision. It is a critical part in many applications such as image search, surveillance, humancomput...
Gemma Roig, Xavier Boix Bosch, Fernando De la Torr...
170
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
BodyT2: Throughput and time delay performance assurance for heterogeneous BSNs
—Body sensor networks (BSNs) have been developed for a set of performance-critical applications, including smart healthcare, assisted living, emergency response, athletic perform...
Zhen Ren, Gang Zhou, Andrew Pyles, Matthew Keally,...
138
Voted
SIGMOD
2011
ACM
170views Database» more  SIGMOD 2011»
14 years 6 months ago
Warding off the dangers of data corruption with amulet
Occasional corruption of stored data is an unfortunate byproduct of the complexity of modern systems. Hardware errors, software bugs, and mistakes by human administrators can corr...
Nedyalko Borisov, Shivnath Babu, NagaPramod Mandag...
134
Voted
IACR
2011
86views more  IACR 2011»
14 years 3 months ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf
« Prev « First page 1014 / 1114 Last » Next »