Sciweavers

2846 search results - page 523 / 570
» Personalization of a Trust Network
Sort
View
CCS
2008
ACM
15 years 2 months ago
Code injection attacks on harvard-architecture devices
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited me...
Aurélien Francillon, Claude Castelluccia
DEBS
2008
ACM
15 years 2 months ago
Access control in publish/subscribe systems
Two convincing paradigms have emerged for achieving scalability in widely distributed systems: publish/subscribe communication and role-based, policy-driven control of access to t...
Jean Bacon, David M. Eyers, Jatinder Singh, Peter ...
82
Voted
ECCV
2008
Springer
15 years 2 months ago
Active Image Labeling and Its Application to Facial Action Labeling
For many tasks in computer vision, it is very important to produce the groundtruth data. At present, this is mostly done manually. Manual data labeling is labor-intensive and prone...
Lei Zhang, Yan Tong, Qiang Ji
AVI
2006
15 years 1 months ago
Mobility agents: guiding and tracking public transportation users
Increasingly, public transportation systems are equipped with Global Positioning Systems (GPS) connected to control centers through wireless networks. Controllers use this infrast...
Alexander Repenning, Andri Ioannidou
111
Voted
MOBICOM
2010
ACM
15 years 21 days ago
Design and experimental evaluation of multi-user beamforming in wireless LANs
Multi-User MIMO promises to increase the spectral efficiency of next generation wireless systems and is currently being incorporated in future industry standards. Although a signi...
Ehsan Aryafar, Narendra Anand, Theodoros Salonidis...