Sciweavers

1539 search results - page 217 / 308
» Active Correlation Tracking
Sort
View
ICISC
2007
102views Cryptology» more  ICISC 2007»
15 years 3 months ago
Passive Attacks on a Class of Authentication Protocols for RFID
Abstract. Mutual authentication mechanisms can be used in RFID systems to preserve the confidentiality of the RFID tags. Hiding the unique IDs of the tags is critical to prevent u...
Basel Alomair, Loukas Lazos, Radha Poovendran
112
Voted
AAAI
2004
15 years 3 months ago
Learning and Inferring Transportation Routines
This paper introduces a hierarchical Markov model that can learn and infer a user's daily movements through the commue model uses multiple levels of abstraction in order to b...
Lin Liao, Dieter Fox, Henry A. Kautz
DICTA
2003
15 years 3 months ago
Real-time Surveillance System by Use of the Face Understanding Technologies
This paper introduced a human surveillance system which integrated the face understanding technologies to recognize personal identities in real time. We proposed a coarse-to-fine s...
Yi-Tsung Chien, Yea-Shuan Huang, Sheng-Wen Jeng, Y...
CORR
2006
Springer
142views Education» more  CORR 2006»
15 years 2 months ago
Social Browsing on Flickr
The new social media sites--blogs, wikis, del.icio.us and Flickr, among others--underscore the transformation of the Web to a participatory medium in which users are actively crea...
Kristina Lerman, Laurie Jones
IJCAT
2008
72views more  IJCAT 2008»
15 years 2 months ago
Capacity analysis of container terminals using simulation techniques
Modeling and simulation are essential tools for the design and analysis of container terminals. A computer model can emulate the activities at various levels of details and captur...
Shell-Ying Huang, Wen-Jing Hsu, Chuanyu Chen, Rong...