Sciweavers

8655 search results - page 1383 / 1731
» Challenges for Trusted Computing
Sort
View
164
Voted
CIMAGING
2009
265views Hardware» more  CIMAGING 2009»
15 years 4 months ago
Multi-object segmentation using coupled nonparametric shape and relative pose priors
We present a new method for multi-object segmentation in a maximum a posteriori estimation framework. Our method is motivated by the observation that neighboring or coupling objec...
Mustafa Gökhan Uzunbas, Octavian Soldea, M&uu...
125
Voted
ECAI
2010
Springer
15 years 4 months ago
EP for Efficient Stochastic Control with Obstacles
Abstract. We address the problem of continuous stochastic optimal control in the presence of hard obstacles. Due to the non-smooth character of the obstacles, the traditional appro...
Thomas Mensink, Jakob J. Verbeek, Bert Kappen
144
Voted
CNL
2009
15 years 4 months ago
Controlled English Ontology-Based Data Access
Abstract. As it is well-known, querying and managing structured data in natural language is a challenging task due to its ambiguity (syntactic and semantic) and its expressiveness....
Camilo Thorne, Diego Calvanese
150
Voted
ECIR
2010
Springer
15 years 4 months ago
Aggregation of Multiple Judgments for Evaluating Ordered Lists
Abstract. Many tasks (e.g., search and summarization) result in an ordered list of items. In order to evaluate such an ordered list of items, we need to compare it with an ideal or...
Hyun Duk Kim, ChengXiang Zhai, Jiawei Han
116
Voted
FC
2010
Springer
150views Cryptology» more  FC 2010»
15 years 4 months ago
A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets
Abstract. It is becoming more common for researchers to find themselves in a position of being able to take over control of a malicious botnet. If this happens, should they use thi...
David Dittrich, Felix Leder, Tillmann Werner
« Prev « First page 1383 / 1731 Last » Next »