Sciweavers

196 search results - page 26 / 40
» On Isolating Points Using Disks
Sort
View
CSREASAM
2006
13 years 9 months ago
Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security
Identity theft continues to be an ever-present problem. Identity theft and other related crimes are becoming an unparalleled phenomenon that nearly everyone will have to deal with...
Jonathan White, Dale Thompson
ASE
2006
78views more  ASE 2006»
13 years 7 months ago
Using software evolution to focus architectural recovery
Ideally, a software project commences with requirements gathering and specification, reaches its major milestone with system implementation and delivery, and then continues, possi...
Nenad Medvidovic, Vladimir Jakobac
ICPR
2000
IEEE
14 years 8 months ago
Piecewise Linear Skeletonization Using Principal Curves
We propose an algorithm to find piecewise linear skeletons of hand-written characters by using principal curves. The development of the method was inspired by the apparent similar...
Adam Krzyzak, Balázs Kégl
ECCV
2010
Springer
13 years 8 months ago
Location Recognition Using Prioritized Feature Matching
We present a fast, simple location recognition and image localization method that leverages feature correspondence and geometry estimated from large Internet photo collections. Suc...
Yunpeng Li, Noah Snavely, Daniel P. Huttenlocher
SSS
2005
Springer
14 years 1 months ago
Memory Management for Self-stabilizing Operating Systems
This work presents several approaches for designing the memory management component of self stabilizing operating systems. We state the requirements which a memory manager should ...
Shlomi Dolev, Reuven Yagel