Sciweavers

7821 search results - page 1436 / 1565
» Nested Ordered Sets and their Use for Data Modelling
Sort
View
99
Voted
ICCV
2005
IEEE
16 years 2 months ago
Vehicle Identification between Non-Overlapping Cameras without Direct Feature Matching
We propose a novel method for identifying road vehicles between two non-overlapping cameras. The problem is formulated as a same-different classification problem: probability of t...
Ying Shan, Harpreet S. Sawhney, Rakesh Kumar
MICRO
2009
IEEE
132views Hardware» more  MICRO 2009»
15 years 7 months ago
Finding concurrency bugs with context-aware communication graphs
Incorrect thread synchronization often leads to concurrency bugs that manifest nondeterministically and are difficult to detect and fix. Past work on detecting concurrency bugs ...
Brandon Lucia, Luis Ceze
ICDS
2007
IEEE
15 years 7 months ago
On Smart-Care Services: Studies of Visually Impaired Users in Living Contexts
- Smart care technology is any sensor based technology used to aid and support human independent living. Such technologies offer new potential and can give rise to new problems for...
Ying Liu, Jean Bacon, Roger Wilson-Hinds
121
Voted
RSFDGRC
2005
Springer
111views Data Mining» more  RSFDGRC 2005»
15 years 6 months ago
Knowledge Discovery Based Query Answering in Hierarchical Information Systems
The paper concerns failing queries in incomplete Distributed Autonomous Information Systems (DAIS) based on attributes which are hierarchical and which semantics at different site...
Zbigniew W. Ras, Agnieszka Dardzinska, Osman G&uum...
105
Voted
CARDIS
2006
Springer
159views Hardware» more  CARDIS 2006»
15 years 4 months ago
Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags
We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. Similarly to the famous blocker tag sugge...
Claude Castelluccia, Gildas Avoine
« Prev « First page 1436 / 1565 Last » Next »