Sciweavers

672 search results - page 98 / 135
» An assessment of tag presentation techniques
Sort
View
EVI
2010
156views more  EVI 2010»
13 years 2 months ago
GPU implementation of a road sign detector based on particle swarm optimization
Road Sign Detection is a major goal of the Advanced Driving Assistance Systems. Most published work on this problem share the same approach by which signs are first detected and th...
Luca Mussi, Stefano Cagnoni, Elena Cardarelli, Fab...
JSAC
2010
146views more  JSAC 2010»
13 years 2 months ago
NLOS identification and mitigation for localization based on UWB experimental data
Abstract--Sensor networks can benefit greatly from locationawareness, since it allows information gathered by the sensors to be tied to their physical locations. Ultra-wide bandwid...
Stefano Maranò, Wesley M. Gifford, Henk Wym...
ACNS
2011
Springer
237views Cryptology» more  ACNS 2011»
12 years 11 months ago
Private Discovery of Common Social Contacts
The increasing use of computing devices for social interactions propels the proliferation of online social applications, yet, it prompts a number of privacy concerns. One common p...
Emiliano De Cristofaro, Mark Manulis, Bertram Poet...
CCS
2010
ACM
13 years 8 months ago
Sidebuster: automated detection and quantification of side-channel leaks in web application development
A web application is a "two-part" program, with its components deployed both in the browser and in the web server. The communication between these two components inevita...
Kehuan Zhang, Zhou Li, Rui Wang 0010, XiaoFeng Wan...
BMCBI
2005
92views more  BMCBI 2005»
13 years 7 months ago
Predicting functional sites with an automated algorithm suitable for heterogeneous datasets
Background: In a previous report (La et al., Proteins, 2005), we have demonstrated that the identification of phylogenetic motifs, protein sequence fragments conserving the overal...
David La, Dennis R. Livesay