Sciweavers

1459 search results - page 262 / 292
» An authorization model for temporal data
Sort
View
ISI
2003
Springer
15 years 9 months ago
Authorship Analysis in Cybercrime Investigation
Criminals have been using the Internet to distribute a wide range of illegal materials globally in an anonymous manner, making criminal identity tracing difficult in the cybercrime...
Rong Zheng, Yi Qin, Zan Huang, Hsinchun Chen
ICRA
1999
IEEE
133views Robotics» more  ICRA 1999»
15 years 8 months ago
An Autonomous Sensor-Based Path-Planner for Planetary Microrovers
With the success of Mars Pathfinder's Sojourner rover, a new era of planetary exploration has opened, with demand for highly capable mobile robots. These robots must be able ...
Sharon L. Laubach, Joel W. Burdick
WDAG
1995
Springer
102views Algorithms» more  WDAG 1995»
15 years 8 months ago
Larchant-RDOSS: a Distributed Shared Persistent Memory and its Garbage Collector
Larchant-RDOSS is a distributed shared memory that persists on reliable storage across process lifetimes. Memory management is automatic: including consistent caching of data and ...
Marc Shapiro, Paulo Ferreira
EUC
2008
Springer
15 years 6 months ago
Privacy Engine for Context-Aware Enterprise Application Services
Satisfying the varied privacy preferences of individuals, while exposing context data to authorized applications and individuals, remains a major challenge for context-aware compu...
Marion Blount, John Davis, Maria Ebling, William F...
DICTA
2003
15 years 5 months ago
Improved Automatic Skin Detection in Color Images
Abstract. Mahalanobis distance has already proved its strength in human skin detection using a set of skin values. We present this work that uses automatic skin detection after an ...
Filipe Tomaz, Tiago Candeias, Hamid Shahbazkia