Sciweavers

8655 search results - page 330 / 1731
» Challenges for Trusted Computing
Sort
View
ECCV
2006
Springer
16 years 5 months ago
Studying Aesthetics in Photographic Images Using a Computational Approach
Aesthetics, in the world of art and photography, refers to the principles of the nature and appreciation of beauty. Judging beauty and other aesthetic qualities of photographs is a...
Ritendra Datta, Dhiraj Joshi, Jia Li, James Ze Wan...
ICDE
2009
IEEE
129views Database» more  ICDE 2009»
16 years 5 months ago
Computing Distance Histograms Efficiently in Scientific Databases
Abstract-- Particle simulation has become an important research tool in many scientific and engineering fields. Data generated by such simulations impose great challenges to databa...
Yi-Cheng Tu, Shaoping Chen, Sagar Pandit
ICML
2006
IEEE
16 years 4 months ago
Combined central and subspace clustering for computer vision applications
Central and subspace clustering methods are at the core of many segmentation problems in computer vision. However, both methods fail to give the correct segmentation in many pract...
Le Lu, René Vidal
112
Voted
PERCOM
2003
ACM
16 years 3 months ago
Self-Routing in Pervasive Computing Environments Using Smart Messages
Smart Messages (SMs) are dynamic collections of code and data that migrate to nodes of interest in the network and execute on these nodes. A key challenge in programming pervasive...
Cristian Borcea, Chalermek Intanagonwiwat, Akhiles...
MOBISYS
2003
ACM
16 years 3 months ago
Tactics-Based Remote Execution for Mobile Computing
Remote execution can transform the puniest mobile device into a computing giant able to run resource-intensive applications such as natural language translation, speech recognitio...
Rajesh Krishna Balan, Mahadev Satyanarayanan, SoYo...