Sciweavers

1988 search results - page 319 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
CVPR
2004
IEEE
16 years 4 months ago
Restoration of Curved Document Images through 3D Shape Modeling
In this paper, we address the problem of discovering the 3D shape of a book surface from the shading information in a scanned document image. This shapefrom-shading problem is cha...
Zheng Zhang 0003, Chew Lim Tan, Liying Fan
119
Voted
COLCOM
2009
IEEE
15 years 7 months ago
Towards automatic privacy management in Web 2.0 with semantic analysis on annotations
— Sharing personal information and documents is pervasive in Web 2.0 environments, which creates the need for properly controlling shared data. Most existing authorization and po...
Nitya Vyas, Anna Cinzia Squicciarini, Chih-Cheng C...
119
Voted
DCOSS
2009
Springer
15 years 7 months ago
Compressed RF Tomography for Wireless Sensor Networks: Centralized and Decentralized Approaches
Radio Frequency (RF) tomography refers to the process of inferring information about an environment by capturing and analyzing RF signals transmitted between nodes in a wireless se...
Mohammad A. Kanso, Michael G. Rabbat
122
Voted
IPPS
2000
IEEE
15 years 7 months ago
Replicating the Contents of a WWW Multimedia Repository to Minimize Download Time
Dynamic replication algorithms aim at allocating, migrating and deleting copies of an object over various Internet hosts, according to the access patterns exhibited online, so as ...
Thanasis Loukopoulos, Ishfaq Ahmad
141
Voted
ATAL
2008
Springer
15 years 4 months ago
Continual collaborative planning for mixed-initiative action and interaction
Multiagent environments are often highly dynamic and only partially observable which makes deliberative action planning computationally hard. In many such environments, however, a...
Michael Brenner