Sciweavers

7918 search results - page 1581 / 1584
» Model Composition Directives
Sort
View
SIGIR
2011
ACM
14 years 8 days ago
Mining tags using social endorsement networks
Entities on social systems, such as users on Twitter, and images on Flickr, are at the core of many interesting applications: they can be ranked in search results, recommended to ...
Theodoros Lappas, Kunal Punera, Tamás Sarlo...
89
Voted
ICCV
2011
IEEE
13 years 9 months ago
2D-3D Fusion for Layer Decomposition of Urban Facades
We present a method for fusing two acquisition modes, 2D photographs and 3D LiDAR scans, for depth-layer decomposition of urban facades. The two modes have complementary character...
Yangyan Li, Qian Zheng, Andrei Sharf, Daniel Cohen...
CCS
2011
ACM
13 years 9 months ago
Eliminating the hypervisor attack surface for a more secure cloud
Cloud computing is quickly becoming the platform of choice for many web services. Virtualization is the key underlying technology enabling cloud providers to host services for a l...
Jakub Szefer, Eric Keller, Ruby B. Lee, Jennifer R...
IACR
2011
124views more  IACR 2011»
13 years 9 months ago
Efficient Multicast Key Distribution Using HOWF-based Access Control Structures
— Both broadcast encryption (BE) protocols and multicast key distribution (MKD) protocols try to solve the same problem of private group communication. For the first time, we dis...
Jing Liu, Qiong Huang, Bo Yang
HRI
2012
ACM
13 years 5 months ago
Designing persuasive robots: how robots might persuade people using vocal and nonverbal cues
Social robots have to potential to serve as personal, organizational, and public assistants as, for instance, diet coaches, teacher’s aides, and emergency respondents. The succe...
Vijay Chidambaram, Yueh-Hsuan Chiang, Bilge Mutlu
« Prev « First page 1581 / 1584 Last » Next »