Sciweavers

5948 search results - page 1007 / 1190
» Computing Robust Counter-Strategies
Sort
View
145
Voted
ADHOCNOW
2007
Springer
15 years 10 months ago
Information Brokerage Via Location-Free Double Rulings
The in-network aggregation and processing of information is what sets a sensor network apart from a pure data acquisition device. One way to model the exchange of information betwe...
Stefan Funke, Imran Rauf
145
Voted
CIARP
2007
Springer
15 years 9 months ago
Human Detection in Indoor Environments Using Multiple Visual Cues and a Mobile Robot
In order to deploy mobile robots in social environments like indoor buildings, they need to be provided with perceptual abilities to detect people. In the computer vision literatur...
Stefan Pszczólkowski, Alvaro Soto
166
Voted
CIVR
2007
Springer
361views Image Analysis» more  CIVR 2007»
15 years 9 months ago
Interpretability based interest points detection
This paper deals with a new interest points detector. Unlike most standard detectors which concentrate on the local shape of the signal, the main objective of this new operator is...
Ahmed Rebai, Alexis Joly, Nozha Boujemaa
147
Voted
ESORICS
2007
Springer
15 years 9 months ago
Modular Access Control Via Strategic Rewriting
Abstract. Security policies, in particular access control, are fundamental elements of computer security. We address the problem of authoring and analyzing policies in a modular wa...
Daniel J. Dougherty, Claude Kirchner, Hél&e...
120
Voted
EUROPAR
2007
Springer
15 years 9 months ago
Asynchronous Distributed Power Iteration with Gossip-Based Normalization
The dominant eigenvector of matrices defined by weighted links in overlay networks plays an important role in many peer-to-peer applications. Examples include trust management, im...
Márk Jelasity, Geoffrey Canright, Kenth Eng...
« Prev « First page 1007 / 1190 Last » Next »