Sciweavers

1081 search results - page 93 / 217
» Challenges: an application model for pervasive computing
Sort
View
ICICS
2009
Springer
15 years 2 months ago
Trusted Isolation Environment: An Attestation Architecture with Usage Control Model
The Trusted Computing Group (TCG) proposed remote attestation as a solution for establishing trust among distributed applications. However, current TCG attestation architecture req...
Anbang Ruan, Qingni Shen, Liang Gu, Li Wang, Lei S...
CCGRID
2008
IEEE
15 years 11 months ago
WSRF-Based Modeling of Clinical Trial Information for Collaborative Cancer Research
The CancerGrid consortium is developing openstandards cancer informatics to address the challenges posed by modern cancer clinical trials. This paper presents the service-oriented...
Tianyi Zang, Radu Calinescu, Steve Harris, Andrew ...
ICPR
2008
IEEE
15 years 11 months ago
Flexible object recognition in cluttered scenes using relative point distribution models
This paper introduces an edge-based object recognition method that is robust with respect to clutter, occlusion and object deformations. The method combines the use of local featu...
Alexandros Bouganis, Murray Shanahan
CVPR
2011
IEEE
14 years 8 months ago
Learning People Detection Models from Few Training Samples
People detection is an important task for a wide range of applications in computer vision. State-of-the-art methods learn appearance based models requiring tedious collection and ...
Leonid Pishchulin, Christian Wojek, Arjun Jain, Th...
HICSS
2008
IEEE
181views Biometrics» more  HICSS 2008»
15 years 11 months ago
Systems Theory Model for Information Security
Architecting security solutions for today’s diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databas...
Wm. Arthur Conklin, Glenn B. Dietrich