Sciweavers

8655 search results - page 335 / 1731
» Challenges for Trusted Computing
Sort
View
133
Voted
CORR
2010
Springer
173views Education» more  CORR 2010»
15 years 2 months ago
An Approach to Ad hoc Cloud Computing
We consider how underused computing resources within an enterprise may be harnessed to improve utilization and create an elastic computing infrastructure. Most current cloud provi...
Graham N. C. Kirby, Alan Dearle, Angus Macdonald, ...
126
Voted
ISVC
2010
Springer
15 years 2 months ago
Computer-Generated Tie-Dyeing Using a 3D Diffusion Graph
Abstract. Hand dyeing generates artistic representations with unique and complex patterns. The aesthetics of dyed patterns on a cloth originate from the physical properties of dyei...
Yuki Morimoto, Kenji Ono
140
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Sparse common spatial patterns in brain computer interface applications
The Common Spatial Pattern (CSP) method is a powerful technique for feature extraction from multichannel neural activity and widely used in brain computer interface (BCI) applicat...
Fikri Goksu, Nuri Firat Ince, Ahmed H. Tewfik
128
Voted
IUI
2012
ACM
13 years 11 months ago
Towards recognizing "cool": can end users help computer vision recognize subjective attributes of objects in images?
Recent computer vision approaches are aimed at richer image interpretations that extend the standard recognition of objects in images (e.g., cars) to also recognize object attribu...
William Curran, Travis Moore, Todd Kulesza, Weng-K...
156
Voted
SIGCOMM
2012
ACM
13 years 6 months ago
FairCloud: sharing the network in cloud computing
e network, similar to CPU and memory, is a critical and shared resource in the cloud. However, unlike other resources, it is neither shared proportionally to payment, nor do cl...
Lucian Popa 0002, Gautam Kumar, Mosharaf Chowdhury...