Sciweavers

24529 search results - page 4757 / 4906
» Computing on Authenticated Data
Sort
View
161
Voted
AVSS
2009
IEEE
15 years 10 months ago
A 3D Face Model for Pose and Illumination Invariant Face Recognition
Generative 3D face models are a powerful tool in computer vision. They provide pose and illumination invariance by modeling the space of 3D faces and the imaging process. The powe...
Pascal Paysan, Reinhard Knothe, Brian Amberg, Sami...
145
Voted
PERCOM
2009
ACM
15 years 10 months ago
Auction-Based Congestion Management for Target Tracking in Wireless Sensor Networks
—This paper addresses the problem of providing congestion-management for a shared wireless sensor networkbased target tracking system. In many large-scale wireless sensor network...
Lei Chen 0005, Boleslaw K. Szymanski, Joel W. Bran...
122
Voted
SENSYS
2009
ACM
15 years 10 months ago
Optimal clock synchronization in networks
Having access to an accurate time is a vital building block in all networks; in wireless sensor networks even more so, because wireless media access or data fusion may depend on i...
Christoph Lenzen, Philipp Sommer, Roger Wattenhofe...
117
Voted
CCS
2009
ACM
15 years 10 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...
199
Voted
EDBT
2009
ACM
302views Database» more  EDBT 2009»
15 years 10 months ago
RankClus: integrating clustering with ranking for heterogeneous information network analysis
As information networks become ubiquitous, extracting knowledge from information networks has become an important task. Both ranking and clustering can provide overall views on in...
Yizhou Sun, Jiawei Han, Peixiang Zhao, Zhijun Yin,...
« Prev « First page 4757 / 4906 Last » Next »