Sciweavers

2845 search results - page 281 / 569
» Constraints over Ontologies
Sort
View
ECBS
2008
IEEE
86views Hardware» more  ECBS 2008»
15 years 7 months ago
A Formal Model for Network-Wide Security Analysis
Network designers perform challenging tasks with so many configuration options that it is often hard or even impossible for a human to predict all potentially dangerous situation...
Petr Matousek, Jaroslav Ráb, Ondrej Rysavy,...
91
Voted
CISS
2007
IEEE
15 years 7 months ago
The Poisson Fading Channel
—In this first paper of a two-part series, a single-user single-input single-output (SISO) shot-noise-limited Poisson channel is considered over which an information signal is t...
Kaushik Chakraborty, Prakash Narayan
MLMI
2007
Springer
15 years 7 months ago
Gaussian Process Latent Variable Models for Human Pose Estimation
We describe a method for recovering 3D human body pose from silhouettes. Our model is based on learning a latent space using the Gaussian Process Latent Variable Model (GP-LVM) [1]...
Carl Henrik Ek, Philip H. S. Torr, Neil D. Lawrenc...
84
Voted
W4A
2006
ACM
15 years 6 months ago
Web accessibility: is it just a "merry-go-round"?
While many of the issues that are being raised in relation to mobile web accessibility are similar or the same to those that have been promoted over the past few years in relation...
Donna Smillie
EUC
2005
Springer
15 years 6 months ago
Ubiquitous Computing: Challenges in Flexible Data Aggregation
Abstract. A dramatic increase of event monitoring capabilities by wireless sensors requires new, more sophisticated, event correlation over time and space. This new paradigm implie...
Eiko Yoneki, Jean Bacon