Sciweavers

3593 search results - page 287 / 719
» A Generative Model Based Approach to Motion Segmentation
Sort
View
116
Voted
ANSS
2004
IEEE
15 years 6 months ago
Normalizing Traffic Pattern with Anonymity for Mission Critical Applications
Intruders often want to analyze traffic pattern to get information for his some malicious activities in ultra-secure network. This paper presents a general approach to prevent tra...
Dongxi Liu, Chi-Hung Chi, Ming Li
ICDE
2006
IEEE
163views Database» more  ICDE 2006»
16 years 4 months ago
A Sampling-Based Approach to Optimizing Top-k Queries in Sensor Networks
Wireless sensor networks generate a vast amount of data. This data, however, must be sparingly extracted to conserve energy, usually the most precious resource in battery-powered ...
Adam Silberstein, Carla Schlatter Ellis, Jun Yang ...
122
Voted
ICDCS
2007
IEEE
15 years 9 months ago
Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach
Security and reliability of network protocol implementations are essential for communication services. Most of the approaches for verifying security and reliability, such as forma...
Guoqiang Shu, David Lee
118
Voted
MIG
2010
Springer
15 years 1 months ago
Angular Momentum Control in Coordinated Behaviors
This paper explores the many uses of angular momentum regulation and its role in the synthesis of coordinated motion generated with physically based characters. Previous investigat...
Victor B. Zordan
106
Voted
SPIESR
2001
141views Database» more  SPIESR 2001»
15 years 4 months ago
Image retrieval based on region shape similarity
This paper presents an image retrieval method based on region shape similarity. In our approach, we first segment images into primitive regions and then combine some of the primit...
Cheng Chang, Wenyin Liu, HongJiang Zhang