Sciweavers

4266 search results - page 641 / 854
» The container loading problem
Sort
View
ISCC
2007
IEEE
14 years 2 months ago
Validating Attacks on Authentication Protocols
— It is possible to show that well-known attacks on authentication protocols are flawed. This is a problem, since good protocols may thus be dismissed rather than improved and p...
Anders Moen Hagalisletto
PDP
2007
IEEE
14 years 2 months ago
HAND: Highly Available Dynamic Deployment Infrastructure for Globus Toolkit 4
—Grid computing is becoming more and more attractive for coordinating large-scale heterogeneous resource sharing and problem solving. Of particular interest for effective Grid co...
Li Qi, Hai Jin, Ian T. Foster, Jarek Gawor
ACCV
2007
Springer
14 years 2 months ago
Recognition of Digital Images of the Human Face at Ultra Low Resolution Via Illumination Spaces
Recent work has established that digital images of a human face, collected under various illumination conditions, contain discriminatory information that can be used in classifica...
Jen-Mei Chang, Michael Kirby, Holger Kley, Chris P...
ADC
2007
Springer
170views Database» more  ADC 2007»
14 years 2 months ago
Pruning SIFT for Scalable Near-duplicate Image Matching
The detection of image versions from large image collections is a formidable task as two images are rarely identical. Geometric variations such as cropping, rotation, and slight p...
Jun Jie Foo, Ranjan Sinha
AMR
2007
Springer
143views Multimedia» more  AMR 2007»
14 years 2 months ago
User Modelling for Interactive User-Adaptive Collection Structuring
Abstract. Automatic structuring is one means to ease access to document collections, be it for organization or for exploration. Of even greater help would be a presentation that ad...
Andreas Nürnberger, Sebastian Stober