Sciweavers

4164 search results - page 771 / 833
» Application and desktop sharing
Sort
View
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
14 years 4 months ago
Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior
Abstract. “Secure Device Pairing” is the process of bootstrapping secure communication between two devices over a short- or medium-range wireless channel (such as Bluetooth, Wi...
Nitesh Saxena, Md. Borhan Uddin
CIKM
2009
Springer
14 years 4 months ago
Linear predictive coding representation of correlated mutation for protein sequence alignment
Background: Although both conservation and correlated mutation (CM) are important information reflecting the different sorts of context in multiple sequence alignment, most of ali...
Chan-seok Jeong, Dongsup Kim
ICTIR
2009
Springer
14 years 4 months ago
PageRank: Splitting Homogeneous Singular Linear Systems of Index One
Abstract. The PageRank algorithm is used today within web information retrieval to provide a content-neutral ranking metric over web pages. It employs power method iterations to so...
Douglas V. de Jager, Jeremy T. Bradley
MM
2009
ACM
217views Multimedia» more  MM 2009»
14 years 4 months ago
Label to region by bi-layer sparsity priors
In this work, we investigate how to automatically reassign the manually annotated labels at the image-level to those contextually derived semantic regions. First, we propose a bi-...
Xiaobai Liu, Bin Cheng, Shuicheng Yan, Jinhui Tang...
MM
2009
ACM
245views Multimedia» more  MM 2009»
14 years 4 months ago
Concept detectors: how good is good enough?
Today, semantic concept based video retrieval systems often show insufficient performance for real-life applications. Clearly, a big share of the reason is the lacking performance...
Robin Aly, Djoerd Hiemstra