Sciweavers

4029 search results - page 679 / 806
» Experience with Software Watermarking
Sort
View
ACSAC
2010
IEEE
14 years 8 months ago
Kells: a protection framework for portable data
Portable storage devices, such as key-chain USB devices, are ubiquitous. These devices are often used with impunity, with users repeatedly using the same storage device in open co...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
ADHOCNETS
2010
Springer
14 years 8 months ago
Balanced Itinerary Planning for Multiple Mobile Agents in Wireless Sensor Networks
In this paper, we consider the use of multiple mobile software agents to perform different tasks in wireless sensor networks (WSNs). To this regard, determining the number of mobil...
Min Chen, Wei Cai, Sergio González-Valenzue...
CIKM
2010
Springer
14 years 8 months ago
Online stratified sampling: evaluating classifiers at web-scale
Deploying a classifier to large-scale systems such as the web requires careful feature design and performance evaluation. Evaluation is particularly challenging because these larg...
Paul N. Bennett, Vitor R. Carvalho
CNSM
2010
14 years 8 months ago
Evaluating impact of manageability features on device performance
Manageability is a key design constraint for IT solutions, defined as the range of operations required to maintain and administer system resources through their lifecycle phases. E...
Jacob Leverich, Vanish Talwar, Parthasarathy Ranga...
CVPR
2010
IEEE
14 years 8 months ago
Efficient computation of robust low-rank matrix approximations in the presence of missing data using the L1 norm
The calculation of a low-rank approximation of a matrix is a fundamental operation in many computer vision applications. The workhorse of this class of problems has long been the ...
Anders Eriksson, Anton van den Hengel