Sciweavers

10790 search results - page 2139 / 2158
» Using feature models to automate model transformations
Sort
View
EDBT
2008
ACM
147views Database» more  EDBT 2008»
16 years 4 months ago
iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage
In this demonstration, we present the design and features of iDataGuard. iDataGuard is an interoperable security middleware that allows users to outsource their file systems to he...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
EUROSYS
2006
ACM
16 years 1 months ago
Ferret: a toolkit for content-based similarity search of feature-rich data
Building content-based search tools for feature-rich data has been a challenging problem because feature-rich data such as audio recordings, digital images, and sensor data are in...
Qin Lv, William Josephson, Zhe Wang, Moses Charika...
PLDI
2009
ACM
15 years 11 months ago
A language for information flow: dynamic tracking in multiple interdependent dimensions
This paper presents λI , a language for dynamic tracking of information flow across multiple, interdependent dimensions of information. Typical dimensions of interest are integr...
Avraham Shinnar, Marco Pistoia, Anindya Banerjee
MM
2009
ACM
252views Multimedia» more  MM 2009»
15 years 10 months ago
Localizing volumetric motion for action recognition in realistic videos
This paper presents a novel motion localization approach for recognizing actions and events in real videos. Examples include StandUp and Kiss in Hollywood movies. The challenge ca...
Xiao Wu, Chong-Wah Ngo, Jintao Li, Yongdong Zhang
SOUPS
2009
ACM
15 years 10 months ago
Challenges in supporting end-user privacy and security management with social navigation
Social navigation is a promising approach for supporting privacy and security management. By aggregating and presenting the choices made by others, social navigation systems can p...
Jeremy Goecks, W. Keith Edwards, Elizabeth D. Myna...
« Prev « First page 2139 / 2158 Last » Next »