Sciweavers

446 search results - page 82 / 90
» On Anonymity of Group Signatures
Sort
View
ECOOP
2006
Springer
15 years 1 months ago
Modeling Runtime Behavior in Framework-Based Applications
Abstract. Our research group has analyzed many industrial, frameworkbased applications. In these applications, simple functionality often requires excessive runtime activity. It is...
Nick Mitchell, Gary Sevitsky, Harini Srinivasan
CLEF
2008
Springer
14 years 11 months ago
Medical Image Annotation in ImageCLEF 2008
Abstract. The ImageCLEF 2008 medical image annotation task is designed to assess the quality of content-based image retrieval and image classification by means of global signatures...
Thomas Deselaers, Thomas Martin Deserno
AAAI
2010
14 years 11 months ago
Community-Guided Learning: Exploiting Mobile Sensor Users to Model Human Behavior
Modeling human behavior requires vast quantities of accurately labeled training data, but for ubiquitous people-aware applications such data is rarely attainable. Even researchers...
Daniel Peebles, Hong Lu, Nicholas D. Lane, Tanzeem...
CVGIP
2006
171views more  CVGIP 2006»
14 years 9 months ago
Breathe easy: Model and control of human respiration for computer animation
In this paper, we detail an anatomically inspired, physically based model of the human torso designed for the visual simulation of respiration using a mixed system of rigid and de...
Victor B. Zordan, Bhrigu Celly, Bill Yuan-chi Chiu...
CN
2007
106views more  CN 2007»
14 years 9 months ago
Learning DFA representations of HTTP for protecting web applications
Intrusion detection is a key technology for self-healing systems designed to prevent or manage damage caused by security threats. Protecting web server-based applications using in...
Kenneth L. Ingham, Anil Somayaji, John Burge, Step...