Sciweavers

3343 search results - page 568 / 669
» Network Objects
Sort
View
SISW
2003
IEEE
15 years 7 months ago
Decentralized Authentication Mechanisms for Object-based Storage Devices
Network-attached object-based storage separates data-path from control-path and enables direct interaction between clients and the storage devices. Clients interact with the file...
Vishal Kher, Yongdae Kim
AMR
2008
Springer
248views Multimedia» more  AMR 2008»
15 years 3 months ago
Mobile Museum Guide Based on Fast SIFT Recognition
Abstract. This article explores the feasibility of a market-ready, mobile pattern recognition system based on the latest findings in the field of object recognition and currently a...
Boris Ruf, Effrosini Kokiopoulou, Marcin Detynieck...
DAIS
2001
15 years 3 months ago
Sentient Computing for Everyone
: Sentient Computing gives perception to computing systems so that they can detect, interpret and respond to changing aspects of users' context. The location attribute of a us...
Diego López de Ipiña, Sai Lai Lo
CAI
2011
Springer
14 years 8 months ago
Email Analysis and Information Extraction for Enterprise Benefit
In spite of rapid advances in multimedia and interactive technologies, enterprise users prefer to battle with email spam and overload rather than lose the benefits of communicatin...
Michal Laclavik, Stefan Dlugolinsky, Martin Seleng...
ICASSP
2011
IEEE
14 years 5 months ago
3D image geo-registration using vision-based modeling
Image geo-registration is the process of relating a photograph and its pose to referenced world coordinates. The application is relevant, especially to the social networking, phot...
Karl Ni, Zachary Sun, Nadya Bliss