Sciweavers

756 search results - page 20 / 152
» Leveraging the CAPTCHA Problem
Sort
View
ESSOS
2011
Springer
13 years 10 days ago
The Security Twin Peaks
The feedback from architectural decisions to the elaboration of requirements is an established concept in the software engineering community. However, pinpointing the nature of thi...
Thomas Heyman, Koen Yskout, Riccardo Scandariato, ...
TMA
2012
Springer
254views Management» more  TMA 2012»
12 years 4 months ago
Steps towards the Extraction of Vehicular Mobility Patterns from 3G Signaling Data
Abstract. The signaling traffic of a cellular network is rich of information related to the movements of its devices across cell boundaries. Thus, passive monitoring of anonymized ...
Pierdomenico Fiadino, Danilo Valerio, Fabio Riccia...
INFOCOM
2012
IEEE
11 years 11 months ago
Energy-optimal mobile application execution: Taming resource-poor mobile devices with cloud clones
Abstract—In this paper, we propose to leverage cloud computing to tame resource-poor mobile devices. Specifically, mobile applications can be executed in the mobile device (know...
Yonggang Wen, Weiwen Zhang, Haiyun Luo
CVPR
2012
IEEE
11 years 11 months ago
Weak attributes for large-scale image retrieval
Attribute-based query offers an intuitive way of image retrieval, in which users can describe the intended search targets with understandable attributes. In this paper, we develop...
Felix X. Yu, Rongrong Ji, Ming-Hen Tsai, Guangnan ...
CVPR
2012
IEEE
11 years 11 months ago
3D visual phrases for landmark recognition
In this paper, we study the problem of landmark recognition and propose to leverage 3D visual phrases to improve the performance. A 3D visual phrase is a triangular facet on the s...
Qiang Hao, Rui Cai, Zhiwei Li, Lei Zhang 0001, Yan...