Sciweavers

1620 search results - page 39 / 324
» eg 2010
Sort
View
TRUST
2010
Springer
15 years 9 months ago
Robust Combiners for Software Hardening
All practical software hardening schemes, as well as practical encryption schemes, e.g., AES, were not proven to be secure. One technique to enhance security is robust combiners. A...
Amir Herzberg, Haya Shulman
WWIC
2010
Springer
203views Communications» more  WWIC 2010»
15 years 9 months ago
Distributed Cooperation and Diversity for Hybrid Wireless Networks
In this paper, we propose a new Distributed Cooperation and Diversity Combining framework. Our focus is heterogeneous networks with devices equipped with two types of radio frequen...
Hooman Javaheri, Guevara Noubir, Y. Wang
ECCV
2010
Springer
15 years 9 months ago
Human Attributes from 3D Pose Tracking
We show that, from the output of a simple 3D human pose tracker one can infer physical attributes (e.g., gender and weight) and aspects of mental state (e.g., happiness or sadness)...
SIGMOD
2010
ACM
188views Database» more  SIGMOD 2010»
15 years 9 months ago
A demonstration of FlexPref: extensible preference evaluation inside the DBMS engine
This demonstration presents FlexPref, a framework implemented inside the DBMS query processor that enables efficient and extensible preference query processing. FlexPref provides ...
Justin J. Levandoski, Mohamed F. Mokbel, Mohamed E...
KR
2010
Springer
15 years 8 months ago
Understanding Ontological Levels
In this paper, I defend a multiplicative approach that distinguishes statues from amounts of matter, political entities from physical ones, qua entities (e.g. John qua Alitalia pa...
Claudio Masolo