Sciweavers

7179 search results - page 1295 / 1436
» Design for Product Adaptability
Sort
View
FDTC
2006
Springer
102views Cryptology» more  FDTC 2006»
14 years 12 hour ago
Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
With physical attacks threatening the security of current cryptographic schemes, no security policy can be developed without taking into account the physical nature of computation....
Alfonso De Gregorio
AMFG
2003
IEEE
168views Biometrics» more  AMFG 2003»
14 years 6 hour ago
Efficient Active Appearance Model for Real-Time Head and Facial Feature Tracking
This paper addresses the 3D tracking of pose and animation of the human face in monocular image sequences using Active Appearance Models. The classical appearancebased tracking su...
Fadi Dornaika, Jörgen Ahlberg
ESAW
2000
Springer
13 years 12 months ago
Context-Dependency in Internet-Agent Coordination
The design and development of Internet applications can take advantage of a paradigm based on autonomous and mobile agents. However, agent mobility introduces peculiar coordinatio...
Giacomo Cabri, Letizia Leonardi, Franco Zambonelli
GCSE
2000
Springer
13 years 12 months ago
Generic Components: A Symbiosis of Paradigms
Software reuse and especially the paradigm of software components are promising approaches to increase the efficiency of software development. One of the basic problems of software...
Martin Becker
WWW
2010
ACM
13 years 12 months ago
Diversifying landmark image search results by learning interested views from community photos
In this paper, we demonstrate a novel landmark photo search and browsing system, Agate, which ranks landmark image search results considering their relevance, diversity and qualit...
Yuheng Ren, Mo Yu, Xin-Jing Wang, Lei Zhang, Wei-Y...
« Prev « First page 1295 / 1436 Last » Next »