Sciweavers

1898 search results - page 321 / 380
» Weak Keys for IDEA
Sort
View
TITB
2010
123views Education» more  TITB 2010»
14 years 10 months ago
The pseudotemporal bootstrap for predicting glaucoma from cross-sectional visual field data
Progressive loss of the field of vision is characteristic of a number of eye diseases such as glaucoma, a leading cause of irreversible blindness in the world. Recently, there has ...
Allan Tucker, David Garway-Heath
150
Voted
MMM
2011
Springer
244views Multimedia» more  MMM 2011»
14 years 7 months ago
Shape Stylized Face Caricatures
Facial caricatures exaggerate key features to emphasize unique structural and personality traits. It is quite a challenge to retain the identity of the original person despite the ...
Nguyen Kim Hai Le, Why Yong Peng, Golam Ashraf
139
Voted
ATAL
2011
Springer
14 years 3 months ago
GUARDS: game theoretic security allocation on a national scale
Building on research previously reported at AAMAS conferences, this paper describes an innovative application of a novel gametheoretic approach for a national scale security deplo...
James Pita, Milind Tambe, Christopher Kiekintveld,...
194
Voted
CCS
2011
ACM
14 years 3 months ago
Eliminating the hypervisor attack surface for a more secure cloud
Cloud computing is quickly becoming the platform of choice for many web services. Virtualization is the key underlying technology enabling cloud providers to host services for a l...
Jakub Szefer, Eric Keller, Ruby B. Lee, Jennifer R...
155
Voted
TMC
2012
13 years 6 months ago
Elevator-Assisted Sensor Data Collection for Structural Health Monitoring
—Sensor networks nowadays are widely used for structural health monitoring; for example, the sensor monitoring system deployed on the Guangzhou New TV Tower, China. While wired s...
Tao Zhang, Dan Wang, Jiannong Cao, Yi Qing Ni, Lij...