Sciweavers

8655 search results - page 255 / 1731
» Challenges for Trusted Computing
Sort
View
105
Voted
PERCOM
2005
ACM
16 years 2 months ago
Extending Context Models for Privacy in Pervasive Computing Environments
Privacy is widely recognised as a significant obstacle inhibiting the adoption of context-aware applications. In order to remove this obstacle, advances are required in many areas...
Karen Henricksen, Ryan Wishart, Ted McFadden, Jadw...
ISM
2006
IEEE
113views Multimedia» more  ISM 2006»
15 years 9 months ago
Individualization and Flexibility through Computer Algebra Systems in Virtual Laboratories
Virtual labs enable field specific experiments and open them for collaborative and distributed usage. In order to realize comprehensive laboratory set-ups providing a scientifi...
Sabina Jeschke, Thomas Richter
ICSAP
2010
15 years 7 months ago
An Enhanced Implementation of Brain Tumor Detection Using Segmentation Based on Soft Computing
—Image Segmentation is an important and challenging factor in the medical image segmentation. This paper describes segmentation method consisting of two phases. In the first phas...
T. Logeswari, M. Karnan
ESANN
2007
15 years 4 months ago
Computational Intelligence approaches to causality detection
Discovering interdependencies and causal relationships is one of the most relevant challenges raised by the information era. As more and better data become available, there is an u...
Katerina Hlavácková-Schindler, Pablo...
TSMC
2008
113views more  TSMC 2008»
15 years 3 months ago
Computational Methods for Verification of Stochastic Hybrid Systems
Stochastic hybrid system (SHS) models can be used to analyze and design complex embedded systems that operate in the presence of uncertainty and variability. Verification of reacha...
Xenofon D. Koutsoukos, Derek Riley