Sciweavers

1826 search results - page 144 / 366
» Controlling data movement in global computing applications
Sort
View
ICPR
2008
IEEE
15 years 11 months ago
Markerless human motion capture: An application of simulated annealing and Fast Marching Method
Research into optical markerless human motion capture has attracted significant attention. However, the complexity of the human anatomy, ambiguities introduced by lacking full-pe...
Yifan Lu
NSDI
2007
15 years 6 months ago
TightLip: Keeping Applications from Spilling the Beans
Access control misconfigurations are widespread and can result in damaging breaches of confidentiality. This paper presents TightLip, a privacy management system that helps user...
Aydan R. Yumerefendi, Benjamin Mickle, Landon P. C...
PPSN
2010
Springer
15 years 2 months ago
Threshold Selection, Mitosis and Dual Mutation in Cooperative Co-evolution: Application to Medical 3D Tomography
Abstract. We present and analyse the behaviour of specialised operators designed for cooperative coevolution strategy in the framework of 3D tomographic PET reconstruction. The bas...
Franck Patrick Vidal, Evelyne Lutton, Jean Louchet...
PERCOM
2007
ACM
16 years 4 months ago
Dual Ownership: Access Management for Shared Item Information in RFID-enabled Supply Chains
RFID tags combined with globally unique numbering schemes such as the Electronic Product Code (EPC) help standardizing the communication along the supply chain. Participants gener...
Alexander Ilic, Florian Michahelles, Elgar Fleisch
CDC
2008
IEEE
157views Control Systems» more  CDC 2008»
15 years 4 months ago
A hidden Markov filtering approach to multiple change-point models
We describe a hidden Markov modeling approach to multiple change-points that has attractive computational and statistical properties. This approach yields explicit recursive filter...
Tze Leung Lai, Haipeng Xing