Sciweavers

348 search results - page 52 / 70
» Multi-dimensional storage virtualization
Sort
View
107
Voted
MM
2009
ACM
154views Multimedia» more  MM 2009»
15 years 8 months ago
Generating location overviews with images and tags by mining user-generated travelogues
Automatically generating location overviews in the form of both visual and textual descriptions is highly desired for online services such as travel planning, to provide attractiv...
Qiang Hao, Rui Cai, Xin-Jing Wang, Jiang-Ming Yang...
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
15 years 8 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...
MOBIQUITOUS
2007
IEEE
15 years 8 months ago
Towards Scalable and Robust Service Discovery in Ubiquitous Computing Environments via Multi-hop Clustering
Abstract— Large-scale ubiquitous computing environments require scalable and robust service discovery to enable “anytime, anywhere” computing, which is hard to be satisfied ...
Wei Gao
EUC
2007
Springer
15 years 8 months ago
An Activity-Centered Wearable Computing Infrastructure for Intelligent Environment Applications
There are many research efforts that focus on converting everyday environments into intelligent and computationally active environments that support and enhance the abilities of it...
Dipak Surie, Thomas Pederson
100
Voted
ACSAC
2006
IEEE
15 years 8 months ago
Engineering Sufficiently Secure Computing
We propose an architecture of four complimentary technologies increasingly relevant to a growing number of home users and organizations: cryptography, separation kernels, formal v...
Brian Witten