Sciweavers

805 search results - page 119 / 161
» On the Role of Integrity Constraints in Data Integration
Sort
View
CVPR
2010
IEEE
15 years 6 months ago
Nonparametric Higher-Order Learning for Interactive Segmentation
In this paper, we deal with a generative model for multi-label, interactive segmentation. To estimate the pixel likelihoods for each label, we propose a new higher-order formulatio...
Tae Hoon Kim (Seoul National University), Kyoung M...
CSE
2009
IEEE
15 years 4 months ago
Performance Analysis of an HMM-Based Gesture Recognition Using a Wristwatch Device
—Interaction with mobile devices that are intended for everyday use is challenging since such systems are continuously optimized towards small outlines. Watches are a particularl...
Roman Amstutz, Oliver Amft, Brian French, Asim Sma...
75
Voted
SADFE
2008
IEEE
15 years 4 months ago
Finding the Evidence in Tamper-Evident Logs
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S....
COOPIS
2003
IEEE
15 years 3 months ago
What Must (Not) Be Available Where?
Arranging the distribution of data, objects or components is a critical task that can ultimately affect the performance, integrity and reliability of distributed system. This pape...
Felix Bübl
IH
2001
Springer
15 years 2 months ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu