Sciweavers

406 search results - page 76 / 82
» PASSing the provenance challenge
Sort
View
SOUPS
2009
ACM
15 years 4 months ago
Usability and security of out-of-band channels in secure device pairing protocols
Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge that needs to be overcome if the promise of mobile and pervasive computing is to b...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
86
Voted
CVPR
2008
IEEE
15 years 4 months ago
Retinal image registration from 2D to 3D
We propose a 2D registration method for multi-modal image sequences of the retinal fundus, and a 3D metric reconstruction of near planar surface from multiple views. There are two...
Yuping Lin, Gérard G. Medioni
SIGCOMM
2004
ACM
15 years 3 months ago
Sizing router buffers
All Internet routers contain buffers to hold packets during times of congestion. Today, the size of the buffers is determined by the dynamics of TCP’s congestion control algor...
Guido Appenzeller, Isaac Keslassy, Nick McKeown
FAABS
2004
Springer
15 years 3 months ago
Two Formal Gas Models for Multi-agent Sweeping and Obstacle Avoidance
Abstract. The task addressed here is a dynamic search through a bounded region, while avoiding multiple large obstacles, such as buildings. In the case of limited sensors and commu...
Wesley Kerr, Diana F. Spears, William M. Spears, D...
BTW
2003
Springer
93views Database» more  BTW 2003»
15 years 2 months ago
Information Integration in a Global Enterprise: Some Experiences from a Financial Services Company
: In most commercial enterprises, information is scattered across a large number of (legacy) data stores. Moreover, it is nearly impossible to obtain funding to replace these data ...
Robert Marti