Sciweavers

11325 search results - page 2160 / 2265
» Active Model Selection
Sort
View
120
Voted
SUTC
2008
IEEE
15 years 9 months ago
Hovering Information - Self-Organising Information that Finds Its Own Storage
A piece of Hovering Information is a geo-localized information residing in a highly dynamic environment such as a mobile ad hoc network. This information is attached to a geograph...
Alfredo A. Villalba Castro, Giovanna Di Marzo Seru...
157
Voted
WCRE
2008
IEEE
15 years 9 months ago
FAMOOSr 2008: Workshop on FAMIX and Moose in Software Reengineering
The increasing amount of data available about software systems poses new challenges for re- and reverse engineering research, as the proposed approaches need to scale. In this con...
Stéphane Ducasse, Tudor Gîrba, Orla G...
CVPR
2007
IEEE
15 years 9 months ago
A Graph Reduction Method for 2D Snake Problems
Energy-minimizing active contour models (snakes) have been proposed for solving many computer vision problems such as object segmentation, surface reconstruction, and object track...
Jianhua Yan, Keqi Zhang, Chengcui Zhang, Shu-Ching...
ICDE
2007
IEEE
164views Database» more  ICDE 2007»
15 years 9 months ago
Multi-session Separation of Duties (MSoD) for RBAC
Separation of duties (SoD) is a key security requirement for many business and information systems. Role Based Access Controls (RBAC) is a relatively new paradigm for protecting i...
David W. Chadwick, Wensheng Xu, Sassa Otenko, Roma...
147
Voted
SP
2007
IEEE
148views Security Privacy» more  SP 2007»
15 years 9 months ago
DSSS-Based Flow Marking Technique for Invisible Traceback
Law enforcement agencies need the ability to conduct electronic surveillance to combat crime, terrorism, or other malicious activities exploiting the Internet. However, the prolif...
Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zh...
« Prev « First page 2160 / 2265 Last » Next »