Sciweavers

6631 search results - page 1324 / 1327
» Challenges from Information Extraction to Information Fusion
Sort
View
SADFE
2010
IEEE
14 years 7 months ago
Fonts for Forensics
: Like other latent evidence that cannot be directly perceived by people, bit sequences have to be presented through tools. Presentations of digital forensic evidence often involve...
Fred Cohen
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
14 years 7 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
HCI
2009
14 years 7 months ago
User Interface Adaptation of Web-Based Services on the Semantic Web
Abstract. The Web is constantly evolving into an unprecedented and continuously growing source of knowledge, information and services, potentially accessed at by anyone anytime, an...
Nikolaos Partarakis, Constantina Doulgeraki, Aster...
CVPR
2011
IEEE
14 years 5 months ago
Particle Filter with State Permutations for Solving Image Jigsaw Puzzles
We deal with an image jigsaw puzzle problem, which is defined as reconstructing an image from a set of square and non-overlapping image patches. It is known that a general instan...
Xingwei Yang, Nagesh Adluru, LonginJan Latecki
SOICT
2010
14 years 4 months ago
Constraint-based local search for solving non-simple paths problems on graphs: application to the routing for network covering p
Routing problems have been considered as central problems in the fields of transportation, distribution and logistics. LS(Graph) is a generic framework allowing to model and solve...
Pham Quang Dung, Phan-Thuan Do, Yves Deville, Tuon...
« Prev « First page 1324 / 1327 Last » Next »