Sciweavers

1690 search results - page 308 / 338
» A Security Framework for JXTA-Overlay
Sort
View
TIP
2008
165views more  TIP 2008»
13 years 7 months ago
Activity Modeling Using Event Probability Sequences
Changes in motion properties of trajectories provide useful cues for modeling and recognizing human activities. We associate an event with significant changes that are localized in...
Naresh P. Cuntoor, B. Yegnanarayana, Rama Chellapp...
TKDE
2008
134views more  TKDE 2008»
13 years 7 months ago
Contraflow Transportation Network Reconfiguration for Evacuation Route Planning
Given a transportation network having source nodes with evacuees and destination nodes, we want to find a contraflow network configuration (that is, ideal direction for each edge) ...
Sangho Kim, Shashi Shekhar, Manki Min
TPDS
2008
202views more  TPDS 2008»
13 years 7 months ago
Control-Based Adaptive Middleware for Real-Time Image Transmission over Bandwidth-Constrained Networks
Real-time image transmission is crucial to an emerging class of distributed embedded systems operating in open network environments. Examples include avionics mission replanning ov...
Xiaorui Wang, Ming Chen, Huang-Ming Huang, Venkita...
JMM2
2007
122views more  JMM2 2007»
13 years 7 months ago
Hierarchical Model-Based Activity Recognition With Automatic Low-Level State Discovery
Abstract— Activity recognition in video streams is increasingly important for both the computer vision and artificial intelligence communities. Activity recognition has many app...
Justin Muncaster, Yunqian Ma
JSAC
2007
93views more  JSAC 2007»
13 years 7 months ago
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks
— Vehicular Networks (VNs) are emerging, among civilian applications, as a convincing instantiation of the mobile networking technology. However, security is a critical factor an...
Maxim Raya, Panagiotis Papadimitratos, Imad Aad, D...