Sciweavers

2830 search results - page 452 / 566
» No Science without Semantics
Sort
View
WISEC
2010
ACM
15 years 2 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
127
Voted
CORR
2010
Springer
144views Education» more  CORR 2010»
15 years 2 months ago
Adaptive Demodulation in Differentially Coherent Phase Systems: Design and Performance Analysis
Adaptive Demodulation (ADM) is a newly proposed rate-adaptive system which operates without requiring Channel State Information (CSI) at the transmitter (unlike adaptive modulatio...
J. David Brown, Jamshid Abouei, Konstantinos N. Pl...
141
Voted
COMPUTING
2007
101views more  COMPUTING 2007»
15 years 2 months ago
Reverse engineering with subdivision surfaces
Reverse engineering is concerned with the reconstruction of surfaces from three-dimensional point clouds originating from laser-scanned objects. We present an adaptive surface rec...
P. Keller, Martin Bertram, Hans Hagen
137
Voted
PE
2010
Springer
133views Optimization» more  PE 2010»
15 years 1 months ago
Positive Harris recurrence and diffusion scale analysis of a push pull queueing network
We consider a push pull queueing system with two servers and two types of jobs which are processed by the two servers in opposite order, with stochastic generally distributed proc...
Yoni Nazarathy, Gideon Weiss
135
Voted
CHI
2011
ACM
14 years 6 months ago
Knowing funny: genre perception and categorization in social video sharing
Categorization of online videos is often treated as a tag suggestion task; tags can be generated by individuals or by machine classification. In this paper, we suggest categoriza...
Jude Yew, David A. Shamma, Elizabeth F. Churchill