Sciweavers

271 search results - page 48 / 55
» Reliability Techniques for RFID-Based Object Tracking Applic...
Sort
View
EUROSYS
2009
ACM
14 years 5 months ago
Pointless tainting?: evaluating the practicality of pointer tainting
This paper evaluates pointer tainting, an incarnation of Dynamic Information Flow Tracking (DIFT), which has recently become an important technique in system security. Pointer tai...
Asia Slowinska, Herbert Bos
STORAGESS
2005
ACM
14 years 2 months ago
Secure capabilities for a petabyte-scale object-based distributed file system
Recently, the Network-Attached Secure Disk (NASD) model has become a more widely used technique for constructing large-scale storage systems. However, the security system proposed...
Christopher Olson, Ethan L. Miller
BMVC
1998
13 years 10 months ago
A Bi-Directional Integrated Model for Non-Rigid Motion Analysis
To be able to understand the motion of deformable objects, techniques in image processing and computer vision are essential for non-rigid motion analysis in this active research a...
Chunyen Liu
TASLP
2008
129views more  TASLP 2008»
13 years 8 months ago
Chroma Binary Similarity and Local Alignment Applied to Cover Song Identification
Abstract--We present a new technique for audio signal comparison based on tonal subsequence alignment and its application to detect cover versions (i.e., different performances of ...
Joan Serrà, Emilia Gómez, Perfecto H...
PRESENCE
2002
194views more  PRESENCE 2002»
13 years 8 months ago
Explorations in the Use of Augmented Reality for Geographic Visualization
In this paper we describe two explorations in the use of hybrid user interfaces for collaborative geographic data visualization. Our first interface combines three technologies; A...
Nicholas R. Hedley, Mark Billinghurst, Lori Postne...