Sciweavers

8655 search results - page 1596 / 1731
» Trusted computing challenges
Sort
View
151
Voted
ICCV
2011
IEEE
14 years 2 months ago
Articulated Part-based Model for Joint Object Detection and Pose Estimation
Despite recent successes, pose estimators are still somewhat fragile, and they frequently rely on a precise knowledge of the location of the object. Unfortunately, articulated obj...
Min Sun, Silvio Savarese
ICCV
2011
IEEE
14 years 2 months ago
Learning Universal Multi-view Age Estimator by Video Contexts
Most existing techniques for analyzing face images assume that the faces are at near-frontal poses. Generalizing to non-frontal faces is often difficult, due to a dearth of groun...
Zheng Song, Bingbing Ni, Dong Guo, Terence Sim, Sh...
AAAI
2011
14 years 2 months ago
Composite Social Network for Predicting Mobile Apps Installation
We have carefully instrumented a large portion of the population living in a university graduate dormitory by giving participants Android smart phones running our sensing software...
Wei Pan, Nadav Aharony, Alex Pentland
153
Voted
DCOSS
2011
Springer
14 years 2 months ago
Planning the trajectories of multiple mobile sinks in large-scale, time-sensitive WSNs
—Controlled sink mobility has been shown to be very beneficial in lifetime prolongation of wireless sensor networks (WSNs) by avoiding the typical hot-spot problem near the sink...
Wint Yi Poe, Michael Beck, Jens B. Schmitt
153
Voted
EDOC
2011
IEEE
14 years 2 months ago
Modeling Contextual Concerns in Enterprise Architecture
Abstract—Enterprise Architecture approaches are used to provide rigorous descriptions of the organization-wide environment, manage the alignment of deployed services to the organ...
Gonçalo Antunes, José Barateiro, Chr...
« Prev « First page 1596 / 1731 Last » Next »