Sciweavers

20175 search results - page 3958 / 4035
» Is abstraction the key to computing
Sort
View
BTW
2007
Springer
136views Database» more  BTW 2007»
14 years 4 months ago
System P: Completeness-driven Query Answering in Peer Data Management Systems
Abstract: Peer data management systems (PDMS) are a highly dynamic, decentralized infrastructure for large-scale data integration. They consist of a dynamic set of autonomous peers...
Armin Roth, Felix Naumann
CISC
2007
Springer
98views Cryptology» more  CISC 2007»
14 years 4 months ago
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM
Abstract. The Trusted Computing Group (TCG) defines the specifications for the Trusted Platform Module (TPM) and corresponding trust mechanisms that allow a TPM-enabled platform ...
Yongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffr...
CLEAR
2007
Springer
208views Biometrics» more  CLEAR 2007»
14 years 4 months ago
Head Orientation Estimation Using Particle Filtering in Multiview Scenarios
Abstract. This paper presents a novel approach to the problem of determining head pose estimation and face 3D orientation of several people in low resolution sequences from multipl...
Cristian Canton-Ferrer, Josep R. Casas, Montse Par...
DCOSS
2007
Springer
14 years 4 months ago
Separating the Wheat from the Chaff: Practical Anomaly Detection Schemes in Ecological Applications of Distributed Sensor Networ
Abstract. We develop a practical, distributed algorithm to detect events, identify measurement errors, and infer missing readings in ecological applications of wireless sensor netw...
Luís M. A. Bettencourt, Aric A. Hagberg, Le...
DRM
2007
Springer
14 years 4 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
« Prev « First page 3958 / 4035 Last » Next »