Sciweavers

452 search results - page 85 / 91
» date 2010
Sort
View
SP
2010
IEEE
158views Security Privacy» more  SP 2010»
15 years 3 months ago
Tamper Evident Microprocessors
Abstract—Most security mechanisms proposed to date unquestioningly place trust in microprocessor hardware. This trust, however, is misplaced and dangerous because microprocessors...
Adam Waksman, Simha Sethumadhavan
110
Voted
CVPR
2010
IEEE
15 years 2 months ago
Multi-Task Warped Gaussian Process for Personalized Age Estimation
Automatic age estimation from facial images has aroused research interests in recent years due to its promising potential for some computer vision applications. Among the methods ...
Yu Zhang, Dit-Yan Yeung
AAAI
2010
15 years 1 months ago
Recognizing Multi-Agent Activities from GPS Data
Recent research has shown that surprisingly rich models of human behavior can be learned from GPS (positional) data. However, most research to date has concentrated on modeling si...
Adam Sadilek, Henry A. Kautz
DOCENG
2010
ACM
15 years 26 days ago
FormCracker: interactive web-based form filling
Filling out document forms distributed by email or hosted on the Web is still problematic and usually requires a printer and scanner. Users commonly download and print forms, fill...
Laurent Denoue, John Adcock, Scott Carter, Patrick...
HPDC
2010
IEEE
15 years 26 days ago
GatorShare: a file system framework for high-throughput data management
Voluntary Computing systems or Desktop Grids (DGs) enable sharing of commodity computing resources across the globe and have gained tremendous popularity among scientific research...
Jiangyan Xu, Renato J. O. Figueiredo