Sciweavers

8655 search results - page 1682 / 1731
» Challenges for Trusted Computing
Sort
View
CCS
2010
ACM
13 years 11 months ago
Securing wireless sensor networks against large-scale node capture attacks
Securing wireless sensor networks against node capture is a challenging task. All well-known random key pre-distribution systems, including the Eschenauer and Gligor's pionee...
Tuan Manh Vu, Reihaneh Safavi-Naini, Carey William...
CLEF
2010
Springer
13 years 11 months ago
The Robot Vision Track at ImageCLEF 2010
This paper describes the robot vision track that has been proposed to the ImageCLEF 2010 participants. The track addressed the problem of visual place classification, with a specia...
Andrzej Pronobis, Marco Fornoni, Henrik I. Christe...
ICFP
2010
ACM
13 years 11 months ago
Bidirectionalizing graph transformations
Bidirectional transformations provide a novel mechanism for synchronizing and maintaining the consistency of information between input and output. Despite many promising results o...
Soichiro Hidaka, Zhenjiang Hu, Kazuhiro Inaba, Hir...
ISLPED
2010
ACM
351views Hardware» more  ISLPED 2010»
13 years 10 months ago
Hybrid electrical energy storage systems
Electrical energy is a high quality form of energy that can be easily converted to other forms of energy with high efficiency and, even more importantly, it can be used to control...
Massoud Pedram, Naehyuck Chang, Younghyun Kim, Yan...
MM
2010
ACM
200views Multimedia» more  MM 2010»
13 years 10 months ago
Multimodal location estimation
In this article we define a multimedia content analysis problem, which we call multimodal location estimation: Given a video/image/audio file, the task is to determine where it wa...
Gerald Friedland, Oriol Vinyals, Trevor Darrell
« Prev « First page 1682 / 1731 Last » Next »