Sciweavers

8655 search results - page 454 / 1731
» Challenges for Trusted Computing
Sort
View
MOBIHOC
2012
ACM
13 years 6 months ago
Enforcing dynamic spectrum access with spectrum permits
Dynamic spectrum access is a maturing technology that allows next generation wireless devices to make highly efficient use of wireless spectrum. Spectrum can be allocated on an o...
Lei Yang, Zengbin Zhang, Ben Y. Zhao, Christopher ...
SIGIR
2012
ACM
13 years 6 months ago
Automatic suggestion of query-rewrite rules for enterprise search
Enterprise search is challenging for several reasons, notably the dynamic terminology and jargon that are specific to the enterprise domain. This challenge is partly addressed by...
Zhuowei Bao, Benny Kimelfeld, Yunyao Li
DAC
2004
ACM
16 years 5 months ago
Security as a new dimension in embedded system design
The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems. Embedded sys...
Srivaths Ravi, Paul C. Kocher, Ruby B. Lee, Gary M...
ICCV
2009
IEEE
2301views Computer Vision» more  ICCV 2009»
16 years 9 months ago
Class Segmentation and Object Localization with Superpixel Neighborhoods
We propose a method to identify and localize object classes in images. Instead of operating at the pixel level, we advocate the use of superpixels as the basic unit of a class s...
Brian Fulkerson, Andrea Vedaldi, Stefano Soatto
CVPR
1999
IEEE
16 years 6 months ago
Vision-Based Speaker Detection Using Bayesian Networks
The development of user interfaces based on vision and speech requires the solution of a challenging statistical inference problem: The intentions and actions of multiple individu...
James M. Rehg, Kevin P. Murphy, Paul W. Fieguth