Sciweavers

3584 search results - page 671 / 717
» Design considerations for a network of information
Sort
View
TNN
2008
94views more  TNN 2008»
14 years 9 months ago
Individual Stable Space: An Approach to Face Recognition Under Uncontrolled Conditions
There usually exist many kinds of variations in face images taken under uncontrolled conditions, such as changes of pose, illumination, expression, etc. Most previous works on fac...
Xin Geng, Zhi-Hua Zhou, Kate Smith-Miles
JFR
2007
131views more  JFR 2007»
14 years 9 months ago
Adaptive teams of autonomous aerial and ground robots for situational awareness
In this paper, we report on the integration challenges of the various component technologies developed towards the establishment of a framework for deploying an adaptive system of...
M. Ani Hsieh, Anthony Cowley, James F. Keller, Lui...
83
Voted
ACSAC
2010
IEEE
14 years 7 months ago
Keeping data secret under full compromise using porter devices
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
Christina Pöpper, David A. Basin, Srdjan Capk...
CORR
2011
Springer
193views Education» more  CORR 2011»
14 years 1 months ago
How Unique and Traceable are Usernames?
Abstract. Usernames are ubiquitously used for identification and authentication purposes on web services and the Internet at large, ranging from the local-part of email addresses ...
Daniele Perito, Claude Castelluccia, Mohamed Ali K...
CORR
2011
Springer
140views Education» more  CORR 2011»
14 years 1 months ago
A Wiki for Business Rules in Open Vocabulary, Executable English
The problem of business-IT alignment is of widespread economic concern. As one way of addressing the problem, this paper describes an online system that functions as a kind of Wik...
Adrian Walker