Sciweavers

1733 search results - page 194 / 347
» Critical Information Systems Research: A Habermasian Approac...
Sort
View
ACISP
2006
Springer
15 years 7 months ago
Towards Provable Security for Ubiquitous Applications
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
Mike Burmester, Tri Van Le, Breno de Medeiros
IVC
2007
176views more  IVC 2007»
15 years 1 months ago
Kernel-based distance metric learning for content-based image retrieval
ct 8 For a specific set of features chosen for representing images, the performance of a content-based image retrieval (CBIR) system 9 depends critically on the similarity or diss...
Hong Chang, Dit-Yan Yeung
KI
1995
Springer
15 years 5 months ago
Integrating Vision and Language: Towards Automatic Description of Human Movements
The integration of vision and natural languageprocessingincreasingly attracts attention in different areas of AI research. Up to now, however, there have only been a few attempts a...
Gerd Herzog, Karl Rohr
ECBS
1996
IEEE
127views Hardware» more  ECBS 1996»
15 years 5 months ago
Domain Engineering: The Challenge, Status, and Trends
Naval Surface Warfare Center Dahlgren Division; under joint sponsorship of the Office of Naval Research; the Naval Command, Control, and Ocean Surveillance Center; and the Naval S...
Stephanie White, Michael Edwards
ICSE
2000
IEEE-ACM
15 years 5 months ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine