Sciweavers

16606 search results - page 3226 / 3322
» Context Modeling: Task Model and Practice Model
Sort
View
USS
2008
15 years 5 months ago
Verifying Compliance of Trusted Programs
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...
Sandra Rueda, Dave King 0002, Trent Jaeger
ECCV
2010
Springer
15 years 5 months ago
Emotion Recognition from Arbitrary View Facial Images
Abstract. Emotion recognition from facial images is a very active research topic in human computer interaction (HCI). However, most of the previous approaches only focus on the fro...
BIOID
2008
149views Biometrics» more  BIOID 2008»
15 years 5 months ago
Additive Block Coding Schemes for Biometric Authentication with the DNA Data
Abstract. To implement a biometric authentication scheme, the templates of a group of people are stored in the database (DB) under the names of these people. Some person presents a...
Vladimir B. Balakirsky, Anahit R. Ghazaryan, A. J....
141
Voted
IWCMC
2010
ACM
15 years 5 months ago
Decentralized service composition in pervasive computing environments
In a pervasive computing environment, the devices are embedded in the physical world, providing services and interconnected by a communication network. Composition of these servic...
Joanna Izabela Siebert, Jiannong Cao, Long Cheng, ...
144
Voted
CRITICAL
2005
15 years 5 months ago
A manifesto for the performative development of ubiquitous media
This paper addresses design agendas in Human-Computer Interaction and neighbouring fields motivated by the mixing of areas that were mostly kept separate until recently, such as m...
Carlo Jacucci, Giulio Jacucci, Ina Wagner, Thomas ...
« Prev « First page 3226 / 3322 Last » Next »