Sciweavers

897 search results - page 70 / 180
» Identity: How to name it, How to find it
Sort
View
SIGCOMM
2010
ACM
15 years 1 months ago
An analysis of social network-based Sybil defenses
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
Bimal Viswanath, Ansley Post, P. Krishna Gummadi, ...
ECCV
1998
Springer
16 years 3 months ago
Is Machine Colour Constancy Good Enough?
This paper presents a negative result: current machine colour constancy algorithms are not good enough for colour-based object recognition. This result has surprised us since we ha...
Brian V. Funt, Kobus Barnard, Lindsay Martin
ICDE
2005
IEEE
111views Database» more  ICDE 2005»
16 years 3 months ago
Schema Matching using Duplicates
Most data integration applications require a matching between the schemas of the respective data sets. We show how the existence of duplicates within these data sets can be exploi...
Alexander Bilke, Felix Naumann
DAC
1999
ACM
16 years 2 months ago
Memory Exploration for Low Power, Embedded Systems
In embedded system design, the designer has to choose an onchip memory configuration that is suitable for a specific application. To aid in this design choice, we present a memory...
Wen-Tsong Shiue, Chaitali Chakrabarti
CHI
2009
ACM
16 years 2 months ago
Asynchronous gameplay in pervasive multiplayer mobile games
Hannamari Saarenp?? University of Tampere Kanslerinrinne 1 33014 Tampereen Yliopisto, Finland hannamari.saarenpaa@uta.fi Hannu Korhonen Nokia Research P.O. Box 1000 00045 Nokia Gro...
Hannamari Saarenpää, Hannu Korhonen, Jan...