Sciweavers

1054 search results - page 71 / 211
» Determining Computing Science's Role
Sort
View
CSIE
2009
IEEE
15 years 6 months ago
A Location-Based Mechanism for Mobile Device Security
While mobile handheld devices, such as cell phones and PDAs, provide productivity benefits, they also pose new risks. A vital safeguard against unauthorized access to a device’s...
Wayne A. Jansen, Vlad Korolev
WSKS
2009
Springer
15 years 6 months ago
Towards an "Intelligent" Tagging Tool for Blogs
Tagging allows people to effectively organize web resources such as images, bookmarks or blog articles. Things are found easier by browsing tag clouds relying on the tags that hav...
Juraj Frank, Renate Motschnig, Martin Homola
ACSC
2007
IEEE
15 years 6 months ago
From Graphs to Euclidean Virtual Worlds: Visualization of 3D Electronic Institutions
In this paper we propose an algorithm for automatic transformation of a graph into a 3D Virtual World and its Euclidean map, using the rectangular dualization technique. The nodes...
Sara Drago, Anton Bogdanovych, Massimo Ancona, Sim...
FOCS
2007
IEEE
15 years 6 months ago
Planning for Fast Connectivity Updates
Understanding how a single edge deletion can affect the connectivity of a graph amounts to finding the graph bridges. But when faced with d > 1 deletions, can we establish as ...
Mihai Patrascu, Mikkel Thorup
GI
2007
Springer
15 years 6 months ago
A New Approach for Estimating Depth by Fusing Stereo and Defocus Information
: Several algorithms are common for estimating depth from stereo series, but many of them have difficulties when determining depth of objects having periodical structure. This con...
Ioana Gheta, Christian Frese, Michael Heizmann, J&...