Sciweavers

8655 search results - page 449 / 1731
» Challenges for Trusted Computing
Sort
View
ICPR
2004
IEEE
16 years 5 months ago
Parallelizing Motion Segmentation by Perceptual Organization of XYT
The front end of many motion analysis algorithms is usually a process that generates bounding boxes around each moving object, roughly segmenting the objects from the background. ...
Daniel Majchrzak, Sudeep Sarkar
CHI
2004
ACM
16 years 4 months ago
Interviewing over instant messaging
Interviews are a cornerstone of human-computer interaction research. As a research method, they can both be deeply valuable and distinctly challenging. Pragmatic challenges of int...
Amy Voida, Elizabeth D. Mynatt, Thomas Erickson, W...
ICAC
2009
IEEE
15 years 11 months ago
Threat-model-driven runtime adaptation and evaluation of intrusion detection system
We present a mechanism for autonomous self-adaptation of a network-based intrusion detection system (IDS). The system is composed of a set of cooperating agents, each of which is ...
Martin Rehák, Eugen Staab, Volker Fusenig, ...
MIG
2009
Springer
15 years 11 months ago
Camera Planning in Virtual Environments Using the Corridor Map Method
Abstract. Planning high-quality camera motions is a challenging problem for applications dealing with interactive virtual environments. This challenge is caused by conflicting req...
Roland Geraerts
P2P
2008
IEEE
15 years 10 months ago
Scalable Resource Annotation in Peer-to-Peer Grids
Peer-to-peer grids are large-scale, dynamic environments where autonomous sites share computing resources. Producing and maintaining relevant and up-to-date resource information i...
Nazareno Andrade, Elizeu Santos-Neto, Francisco Vi...