Sciweavers

8301 search results - page 1586 / 1661
» Risk-Aware Information Retrieval
Sort
View
IRI
2008
IEEE
14 years 3 months ago
Exercise energy expenditure estimation based on acceleration data using the linear mixed model
This paper introduces a novel algorithm for estimating energy expenditure during physical activity. The estimation is based on acceleration data measured from a wrist-worn acceler...
Eija Haapalainen, Perttu Laurinen, Pekka Siirtola,...
WACV
2008
IEEE
14 years 3 months ago
Localization and Segmentation of A 2D High Capacity Color Barcode
A 2D color barcode can hold much more information than a binary barcode. Barcodes are often intended for consumer use, such as, a consumer can take an image with her cellphone cam...
Devi Parikh, Gavin Jancke
ICC
2007
IEEE
130views Communications» more  ICC 2007»
14 years 3 months ago
Evaluating the Performance of Web Services Composition for Network Management
Abstract— The composition of network management information is a feature widely required but not properly supported in traditional management technologies. In the last years, Web...
Ricardo Lemos Vianna, Maria Janilce Bosquiroli Alm...
ICNP
2007
IEEE
14 years 3 months ago
HEXA: Compact Data Structures for Faster Packet Processing
—Data structures representing directed graphs with edges labeled by symbols from a finite alphabet are used to implement packet processing algorithms used in a variety of network...
Sailesh Kumar, Jonathan S. Turner, Patrick Crowley...
DRM
2007
Springer
14 years 3 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
« Prev « First page 1586 / 1661 Last » Next »