Sciweavers

8655 search results - page 1385 / 1731
» Challenges for Trusted Computing
Sort
View
193
Voted
LDTA
2010
15 years 4 months ago
Embedding a web-based workflow management system in a functional language
Workflow management systems guide and monitor tasks performed by humans and computers. The workflow specifications are usually expressed in special purpose (graphical) formalisms....
Jan Martin Jansen, Rinus Plasmeijer, Pieter W. M. ...
MM
2010
ACM
192views Multimedia» more  MM 2010»
15 years 4 months ago
iLike: integrating visual and textual features for vertical search
Content-based image search on the Internet is a challenging problem, mostly due to the semantic gap between low-level visual features and high-level content, as well as the excess...
Yuxin Chen, Nenghai Yu, Bo Luo, Xue-wen Chen
MM
2010
ACM
126views Multimedia» more  MM 2010»
15 years 4 months ago
Restoration of out-of-focus lecture video by automatic slide matching
Restoring the fine detail in the slide area of a defocused lecture video is a challenging task. In this work, we propose to use clean images of slides available along with the def...
Ngai-Man Cheung, David M. Chen, Vijay Chandrasekha...
136
Voted
MOBICOM
2010
ACM
15 years 4 months ago
Did you see Bob?: human localization using mobile phones
Finding a person in a public place, such as in a library, conference hotel, or shopping mall, can be difficult. The difficulty arises from not knowing where the person may be at t...
Ionut Constandache, Xuan Bao, Martin Azizyan, Romi...
123
Voted
SIGCOMM
2010
ACM
15 years 4 months ago
Caliper: a tool to generate precise and closed-loop traffic
Generating realistic and responsive traffic that reflects different network conditions is a challenging problem associated with performing valid experiments in network testbeds. I...
Monia Ghobadi, Martin Labrecque, Geoffrey Salmon, ...
« Prev « First page 1385 / 1731 Last » Next »