Sciweavers

3582 search results - page 683 / 717
» Designing games with a purpose
Sort
View
ESAS
2004
Springer
14 years 3 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
SIGADA
2004
Springer
14 years 3 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
ECCV
2010
Springer
14 years 3 months ago
3D Point Correspondence by Minimum Description Length in Feature Space
Abstract. Finding point correspondences plays an important role in automatically building statistical shape models from a training set of 3D surfaces. For the point correspondence ...
ACSC
2003
IEEE
14 years 3 months ago
Comparing Industry Benchmarks for J2EE Application Server : IBM's Trade2 vs Sun's ECperf
As the Internet and enterprise wide distributed systems become more prevalent in business IT systems, numerous advanced COTS (commercial off-the-shelf) middleware technologies hav...
Yan Zhang, Anna Liu, Wei Qu
CBMS
2003
IEEE
14 years 3 months ago
Automatic Locating the Centromere on Human Chromosome Pictures
Many genetic disorders or possible abnormalities that may occur in the future generations can be predicted through analyzing the shape and morphological characteristics of the chr...
Mehdi Moradi, Seyed Kamaledin Setarehdan, S. R. Gh...