Sciweavers

1056 search results - page 63 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
CVPR
2010
IEEE
1248views Computer Vision» more  CVPR 2010»
14 years 6 months ago
Food Recognition Using Statistics of Pairwise Local Features
Food recognition is difficult because food items are deformable objects that exhibit significant variations in appearance. We believe the key to recognizing food is to exploit the...
Shulin Yang, Mei Chen, Dean Pomerleau, Rahul Sukth...
ICDE
2009
IEEE
108views Database» more  ICDE 2009»
14 years 4 months ago
Galaxy: Encouraging Data Sharing among Sources with Schema Variants
This demonstration presents Galaxy, a schema manager that facilitates easy and correct data sharing among autonomous but related, evolving data sources. Galaxy reduces heterogenei...
Peter Mork, Len Seligman, Arnon Rosenthal, Michael...
IEEEARES
2009
IEEE
14 years 4 months ago
Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones
Near Field Communication (NFC)-enabled mobile phones and services are starting to appear in the field, yet no attempt was made to analyze the security of NFC-enabled mobile phone...
Collin Mulliner
PAKDD
2009
ACM
133views Data Mining» more  PAKDD 2009»
14 years 4 months ago
On Link Privacy in Randomizing Social Networks
Many applications of social networks require relationship anonymity due to the sensitive, stigmatizing, or confidential nature of relationship. Recent work showed that the simple ...
Xiaowei Ying, Xintao Wu
INFOCOM
2009
IEEE
14 years 4 months ago
Barrier Information Coverage with Wireless Sensors
Abstract—Sensor networks have been deployed for many barrier coverage applications such as intrusion detection and border surveillance. In these applications, it is critical to o...
Guanqun Yang, Daji Qiao