Sciweavers

3210 search results - page 85 / 642
» Secure Similarity Search
Sort
View
165
Voted
AGENTS
1997
Springer
15 years 9 months ago
Fusing Autonomy and Sociability in Robots
Quoting somerobotic examples, I willlist some key issues in fusing autonomy and sociability: tools and control architecture, attention, behavior matching, embodiment, similarity, ...
Yasuo Kuniyoshi
SCS
2003
15 years 6 months ago
Security as a Safety Issue in Rail Communications
Systems whose failure can lead to the damage of property or the environment, or loss of human life are regarded as safety-critical systems. It is no longer adequate to build safet...
Jason Smith, Selwyn Russell, Mark Looi
OOPSLA
2007
Springer
15 years 11 months ago
The transactional memory / garbage collection analogy
This essay presents remarkable similarities between transactional memory and garbage collection. The connections are fascinating in their own right, and they let us better underst...
Dan Grossman
IASTEDSE
2004
15 years 6 months ago
An authorization and access control scheme for pervasive computing
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
Linda Staffans, Titos Saridakis
MM
2006
ACM
148views Multimedia» more  MM 2006»
15 years 11 months ago
Audio similarity measure by graph modeling and matching
This paper proposes a new approach for the similarity measure and ranking of audio clips by graph modeling and matching. Instead of using frame-based or salient-based features to ...
Yuxin Peng, Chong-Wah Ngo, Cuihua Fang, Xiaoou Che...