Sciweavers

8655 search results - page 1189 / 1731
» Challenges for Trusted Computing
Sort
View
TIP
2010
188views more  TIP 2010»
15 years 3 months ago
On-line Learning of Mutually Orthogonal Subspaces for Face Recognition by Image Sets
—We address the problem of face recognition by matching image sets. Each set of face images is represented by a subspace (or linear manifold) and recognition is carried out by su...
Tae-Kyun Kim, Josef Kittler, Roberto Cipolla
139
Voted
TMC
2010
124views more  TMC 2010»
15 years 3 months ago
A Scalable and Energy-Efficient Context Monitoring Framework for Mobile Personal Sensor Networks
—The key feature of many emerging pervasive computing applications is to proactively provide services to mobile individuals. One major challenge in providing users with proactive...
Seungwoo Kang, Jinwon Lee, Hyukjae Jang, Youngki L...
WCNC
2010
IEEE
15 years 3 months ago
Characterization of the Secrecy Region of a Single Relay Cooperative System
Abstract—Security is an important aspect for the future wireless networks. Since the number of network nodes increases constantly, and, in addition, the networks are decentralize...
Ninoslav Marina, Are Hjørungnes
WS
2010
ACM
15 years 3 months ago
Anomalies in ontologies with rules
For the development of practical semantic applications, ontologies are commonly used with rule extensions. Prominent examples of semantic applications are Semantic Wikis, Semantic...
Joachim Baumeister, Dietmar Seipel
LCN
2008
IEEE
15 years 11 months ago
Speedo: Realistic achievable bandwidth in 802.11 through passive monitoring
—End to end available bandwidth is often constrained by IEEE 802.11 hops in the access network. Available bandwidth measurement is particularly challenging in the wireless enviro...
Malik Ahmad Yar Khan, Darryl Veitch
« Prev « First page 1189 / 1731 Last » Next »