Sciweavers

29046 search results - page 5747 / 5810
» Computable Models
Sort
View
83
Voted
CCS
2008
ACM
15 years 6 days ago
Flexible and secure enterprise rights management based on trusted virtual domains
The requirements for secure document workflows in enterprises become increasingly sophisticated, with employees performing different tasks under different roles using the same pro...
Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, ...
95
Voted
MMM
2010
Springer
141views Multimedia» more  MMM 2010»
15 years 6 days ago
Slow Intelligence Systems
: Networks and distributed computing systems are becoming increasingly important and at the same time, more and more critical to the world of Information Technology. This rash spre...
Shi-Kuo Chang
3DPVT
2006
IEEE
295views Visualization» more  3DPVT 2006»
15 years 6 days ago
Efficient Sparse 3D Reconstruction by Space Sweeping
This paper introduces a feature based method for the fast generation of sparse 3D point clouds from multiple images with known pose. We extract sub-pixel edge elements (2D positio...
Joachim Bauer, Christopher Zach, Horst Bischof
90
Voted
CODES
2006
IEEE
15 years 5 days ago
Architectural support for safe software execution on embedded processors
The lack of memory safety in many popular programming languages, including C and C++, has been a cause for great concern in the realm of software reliability, verification, and mo...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
112
Voted
DIALM
2005
ACM
125views Algorithms» more  DIALM 2005»
15 years 5 days ago
Minimizing interference in ad hoc and sensor networks
Reducing interference is one of the main challenges in wireless communication, and particularly in ad hoc networks. The amount of interference experienced by a node v corresponds ...
Thomas Moscibroda, Roger Wattenhofer
« Prev « First page 5747 / 5810 Last » Next »