Sciweavers

1663 search results - page 78 / 333
» Computer Security in the Real World
Sort
View
SEMCO
2007
IEEE
14 years 3 months ago
Perceptual Shape-Based Natural Image Representation and Retrieval
Human visual recognition is based largely on shape, yet effectively using shapes in natural image retrieval is a challenging task. Most existing methods are based on the geometric...
Xiaofen Zheng, Scott A. Sherrill-Mix, Qigang Gao
HICSS
2003
IEEE
193views Biometrics» more  HICSS 2003»
14 years 2 months ago
Ambient computing applications: an experience with the SPREAD approach
Todays, we assist to the explosive development of mobile computing devices like PDAs and cell-phones, the integration of embedded intelligence (like Web server) in more and more c...
Paul Couderc, Michel Banâtre
GI
2005
Springer
14 years 2 months ago
RFID middleware design - addressing both application needs and RFID constraints
: Radio Frequency Identification (RFID) technology has a lot of potential to bridge the gap between the virtual world of enterprise IT systems and the real world of products and l...
Christian Floerkemeier, Matthias Lampe

Lab
820views
12 years 2 months ago
Division for Foundation of Software
Division for foundations of software led by Professor Minoru Ito in graduate school of information science at Nara Institute of Science and Technology, JAPAN, is engaged in researc...
IPPS
1999
IEEE
14 years 1 months ago
An Approach for Measuring IP Security Performance in a Distributed Environment
Abstract. The Navy needs to use Multi Level Security (MLS) techniques in an environment with increasing amount of real time computation brought about by increased automation requir...
Brett L. Chappell, David T. Marlow, Philip M. Irey...