Sciweavers

2446 search results - page 382 / 490
» Principles of dataspace systems
Sort
View
125
Voted
CIVR
2007
Springer
15 years 10 months ago
Comparison of face matching techniques under pose variation
The ability to match faces in video is a crucial component for many multimedia applications such as searching and recognizing people in semantic video browsing, surveillance and h...
Bart Kroon, Alan Hanjalic, Sabri Boughorbel
ESORICS
2007
Springer
15 years 10 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
GECCO
2007
Springer
230views Optimization» more  GECCO 2007»
15 years 10 months ago
Activation energy-based simulation for self-assembly of multi-shape tiles
Building artificial systems using self-assembly is one of the main issues of artificial life [17]. Scientists are trying to understand this process either using experimental appro...
Mostafa Mostafa Hashim Ellabaan
ICCS
2007
Springer
15 years 10 months ago
Exploration of TCM Masters Knowledge Mining
Traditional Chinese medicine (TCM) has a rich knowledge about human health and disease by its special way evolved along a very long history. As modern medicine is achieving much pr...
Xijin Tang, Nan Zhang, Zheng Wang
128
Voted
MIDDLEWARE
2007
Springer
15 years 10 months ago
XenSocket: A High-Throughput Interdomain Transport for Virtual Machines
This paper presents the design and implementation of XenSocket, a UNIX-domain-socket-like construct for high-throughput interdomain (VM-to-VM) communication on the same system. The...
Xiaolan Zhang, Suzanne McIntosh, Pankaj Rohatgi, J...