Sciweavers

24188 search results - page 312 / 4838
» Computing on Encrypted Data
Sort
View
162
Voted
ISWC
2000
IEEE
15 years 8 months ago
Finding Location Using Omnidirectional Video on a Wearable Computing Platform
In this paper we present a framework for a navigation system in an indoor environment using only omnidirectional video. Within a Bayesian framework we seek the appropriate place a...
Wasinee Rungsarityotin, Thad Starner
114
Voted
RTSS
1998
IEEE
15 years 8 months ago
The Time-Triggered Model of Computation
: The Time-Triggered (TT) model of computation is a model for the representation and analysis of the design of large hard real-time systems. Central to this model is the concept of...
Hermann Kopetz
159
Voted
KDD
1998
ACM
181views Data Mining» more  KDD 1998»
15 years 8 months ago
Approaches to Online Learning and Concept Drift for User Identification in Computer Security
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
Terran Lane, Carla E. Brodley
IJHPCN
2006
109views more  IJHPCN 2006»
15 years 4 months ago
Communication issues within high performance computing grids
: This paper presents several ideas pertaining to desirable properties associated with protocols for moving large amounts of data over a grid of high performance computers. The pro...
Robert D. McLeod, Sajid Hussain, Sheng Huang, Mare...
WABI
2010
Springer
143views Bioinformatics» more  WABI 2010»
15 years 2 months ago
Swiftly Computing Center Strings
The center string (or closest string) problem is a classical computer science problem with important applications in computational biology. Given k input strings and a distance thr...
Franziska Hufsky, Léon Kuchenbecker, Kathar...