Sciweavers

8655 search results - page 1415 / 1731
» Challenges for Trusted Computing
Sort
View
122
Voted
SENSYS
2010
ACM
15 years 1 months ago
Locating sensors in the wild: pursuit of ranging quality
Localization is a fundamental issue of wireless sensor networks that has been extensively studied in the literature. The real-world experience from GreenOrbs, a sensor network sys...
Wei Xi, Yuan He, Yunhao Liu, Jizhong Zhao, Lufeng ...
151
Voted
SIGSOFT
2010
ACM
15 years 1 months ago
Software for everyone by everyone
Given the dizzying pace of change in computer science, trying to look too far into the future of software engineering is hard. However, it might be possible to predict the future ...
Tevfik Bultan
141
Voted
SIN
2010
ACM
15 years 1 months ago
A calculus for the qualitative risk assessment of policy override authorization
Policy override is gaining traction in the research community to improve the efficiency and usability of authorization mechanisms. These mechanisms turn the conventional privilege...
Steffen Bartsch
147
Voted
AVSS
2009
IEEE
15 years 1 months ago
Landmark Localisation in 3D Face Data
A comparison of several approaches that use graph matching and cascade filtering for landmark localisation in 3D face data is presented. For the first method, we apply the structur...
Marcelo Romero, Nick Pears
110
Voted
CCIA
2009
Springer
15 years 1 months ago
Patch Growing: Object segmentation using spatial coherence of local patches
Object segmentation is a challenging and important problem in computer vision. The difficulties to obtain accurate segmentations using only the traditional Topdown or Bottom-up ap...
Marc Masias, Albert Torrent, Xavier Lladó, ...
« Prev « First page 1415 / 1731 Last » Next »