Sciweavers

592 search results - page 111 / 119
» Action modeling with volumetric data
Sort
View
CORR
2002
Springer
101views Education» more  CORR 2002»
13 years 7 months ago
Semantic Component Composition
Building complex software systems necessitates the use of component-based architectures. In theory, of the set of components needed for a design, only some small portion of them ar...
Joseph Kiniry
JMIV
2010
131views more  JMIV 2010»
13 years 6 months ago
An SL(2) Invariant Shape Median
Median averaging is a powerful averaging concept on sets of vector data in finite dimensions. A generalization of the median for shapes in the plane is introduced. The underlying ...
Benjamin Berkels, Gina Linkmann, Martin Rumpf
JSAC
2010
194views more  JSAC 2010»
13 years 6 months ago
Burst communication by means of buffer allocation in body sensor networks: Exploiting signal processing to reduce the number of
Abstract—Monitoring human movements using wireless sensory devices promises to revolutionize the delivery of healthcare services. Such platforms use inertial information of their...
Hassan Ghasemzadeh, Vitali Loseu, Sarah Ostadabbas...
TPDS
2010
135views more  TPDS 2010»
13 years 6 months ago
Maximizing Service Reliability in Distributed Computing Systems with Random Node Failures: Theory and Implementation
—In distributed computing systems (DCSs) where server nodes can fail permanently with nonzero probability, the system performance can be assessed by means of the service reliabil...
Jorge E. Pezoa, Sagar Dhakal, Majeed M. Hayat
CSFW
2003
IEEE
14 years 28 days ago
A Procedure for Verifying Security Against Type Confusion Attacks
A type confusion attack is one in which a principal accepts data of one type as data of another. Although it has been shown by Heather et al. that there are simple formatting conv...
Catherine Meadows