Sciweavers

1477 search results - page 71 / 296
» What's the point of documentation
Sort
View
MOBISYS
2011
ACM
12 years 11 months ago
Odessa: enabling interactive perception applications on mobile devices
Resource constrained mobile devices need to leverage computation on nearby servers to run responsive applications that recognize objects, people, or gestures from real-time video....
Moo-Ryong Ra, Anmol Sheth, Lily B. Mummert, Padman...
USS
2008
13 years 10 months ago
Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards
Optical scan electronic voting machines employ software components that are customized for each specific election. Such software components are critical from a security and integr...
Seda Davtyan, Sotiris Kentros, Aggelos Kiayias, La...
RSS
2007
146views Robotics» more  RSS 2007»
13 years 9 months ago
Context and Feature Sensitive Re-sampling from Discrete Surface Measurements
— This paper concerns context and feature-sensitive re-sampling of workspace surfaces represented by 3D point clouds. We interpret a point cloud as the outcome of repetitive and ...
Dave Cole, Paul Newman
ICDE
2007
IEEE
126views Database» more  ICDE 2007»
14 years 9 months ago
Organizing Hidden-Web Databases by Clustering Visible Web Documents
In this paper we address the problem of organizing hidden-Web databases. Given a heterogeneous set of Web forms that serve as entry points to hidden-Web databases, our goal is to ...
Luciano Barbosa, Juliana Freire, Altigran Soares d...
ICDS
2010
IEEE
14 years 3 months ago
e-Fraud Prevention Based on the Self-Authentication of e-Documents
—We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bi...
J. M. Blackledge, E. Coyle