Sciweavers

485 search results - page 50 / 97
» Easy Keys for OWL
Sort
View
CVPR
2011
IEEE
14 years 6 months ago
Importance Filtering for Image Retargeting
Content-aware image retargeting has attracted a lot of interests recently. The key and most challenging issue for this task is how to balance the tradeoff between preserving the i...
Yuanyuan Ding, Jing Xiao
CSMR
2010
IEEE
14 years 5 months ago
Using Architecturally Significant Requirements for Guiding System Evolution
Rapidly changing technology is one of the key triggers of system evolution. Some examples are: physically relocating a data center; replacement of infrastructure such as migrating ...
Ipek Ozkaya, J. Andrés Díaz Pace, Ar...
IJNSEC
2007
110views more  IJNSEC 2007»
14 years 10 months ago
A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices
The Wired Equivalent Privacy (WEP) uses the 64 bit RC4 secret key stream cipher as its layer 2 security protocol. Although the underlying RC4 cipher is secure, the potential reuse...
Chetan Nanjunda Mathur, K. P. Subbalakshmi
AUIC
2006
IEEE
15 years 4 months ago
Implementing a natural user interface for camera phones using visual tags
Pointing is a natural way of communicating. Children in all cultures use pointing inherently. Attaching tags to our environment enables interaction by pointing. Visual tags are a g...
Sanni Siltanen, Jouko Hyväkkä
SIGECOM
2004
ACM
112views ECommerce» more  SIGECOM 2004»
15 years 3 months ago
Self-interested automated mechanism design and implications for optimal combinatorial auctions
Often, an outcome must be chosen on the basis of the preferences reported by a group of agents. The key difficulty is that the agents may report their preferences insincerely to m...
Vincent Conitzer, Tuomas Sandholm