Sciweavers

1663 search results - page 217 / 333
» Computer Security in the Real World
Sort
View
WMASH
2005
ACM
15 years 9 months ago
WilmaGate: a new open access gateway for hotspot management
Wireless access has already become a ubiquitous way to connect to the Internet, but the mushrooming of wireless access infrastructures throughout the world has given rise to a wid...
Mauro Brunato, Danilo Severina
ACISP
2005
Springer
15 years 9 months ago
RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management
Abstract. RFID tags are tiny, inexpensive, inductively powered computers that are going to replace bar codes on many products, but which have many other uses as well. For example, ...
Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenb...
ISI
2005
Springer
15 years 9 months ago
How Question Answering Technology Helps to Locate Malevolent Online Content
The inherent lack of control over the Internet content resulted in proliferation of online material that can be potentially detrimental. For example, the infamous “Anarchist Coo...
Dmitri Roussinov, Jose Antonio Robles-Flores
CVPR
2009
IEEE
16 years 11 months ago
Learning Visual Flows: A Lie Algebraic Approach
We present a novel method for modeling dynamic visual phenomena, which consists of two key aspects. First, the in- tegral motion of constituent elements in a dynamic scene is ca...
Dahua Lin, W. Eric L. Grimson, John W. Fisher III
CVPR
2009
IEEE
16 years 11 months ago
Pose Estimation for Category Specific Multiview Object Localization
We propose an approach to overcome the two main challenges of 3D multiview object detection and localization: The variation of object features due to changes in the viewpoint an...
Mustafa Özuysal, Pascal Fua, Vincent Lepetit